_____ properties are associated with all Microsoft Office documents and include author, title, and subject.

A. Automatic
B. Hidden
C. Replacement
D. Standard


Answer: D

Computer Science & Information Technology

You might also like to view...

The _________ tool provides a way to locate text and replace it

Fill in the blank(s) with correct word

Computer Science & Information Technology

The PivotTable ________ tab focuses on the appearance aspects of designing a PivotTable

Fill in the blank(s) with correct word

Computer Science & Information Technology

Discuss the iostat command and its output.

What will be an ideal response?

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Given the potential vulnerability of DES to a brute-force attack, an alternative has been found. 2. A number of Internet based applications have adopted two-key 3DES, including PGP and S/MIME. 3. The sender is the only one who needs to know an initialization vector. 4. A typical application of Output Feedback mode is stream oriented transmission over noisy channel, such as satellite communication. 5. Cipher Feedback (CFB) is used for the secure transmission of single values.

Computer Science & Information Technology