A command that searches your document for hidden data or personal information that you might not want to share publicly.
A. Synchronization
B. Trusted Documents
C. Inspect Document
C. Inspect Document
Computer Science & Information Technology
You might also like to view...
In order to add or remove an event from a delegate, you would use:
a) the Add and Remove methods b) the Add and Subtract methods c) the += and the -= operators d) events can only be added with the += and not removed from a delegate
Computer Science & Information Technology
Design principles must be used when designing websites. These include:
What will be an ideal response?
Computer Science & Information Technology
________ is one of the most important pieces of information that a company uses to learn more about its financial progress
Fill in the blank(s) with correct word
Computer Science & Information Technology
The _____________tab of a folder's Properties dialog box enables you to configure granular permissions
a. General b. Sharing c. Security d. Granular
Computer Science & Information Technology