A command that searches your document for hidden data or personal information that you might not want to share publicly.

A. Synchronization
B. Trusted Documents
C. Inspect Document


C. Inspect Document

Computer Science & Information Technology

You might also like to view...

In order to add or remove an event from a delegate, you would use:

a) the Add and Remove methods b) the Add and Subtract methods c) the += and the -= operators d) events can only be added with the += and not removed from a delegate

Computer Science & Information Technology

Design principles must be used when designing websites. These include:

What will be an ideal response?

Computer Science & Information Technology

________ is one of the most important pieces of information that a company uses to learn more about its financial progress

Fill in the blank(s) with correct word

Computer Science & Information Technology

The _____________tab of a folder's Properties dialog box enables you to configure granular permissions

a. General b. Sharing c. Security d. Granular

Computer Science & Information Technology