Megan needs to distribute a document over the Internet. Before she does so, what should she do to ensure that her private information is removed and that the file is accessible to as many people as possible?
What will be an ideal response?
Megan should first follow these steps to ensure that her private and confidential information is removed from the document:
1. Click the FILE tab to open Backstage view.
2. Click the Check for Issues button then click Inspect Document to open the Document Inspector.
3. Make sure all check boxes are selected, then click Inspect.
4. Click Remove All next to each category to ensure that sensitive information is removed, then click Close.
She should then use the other Check for Issues options to ensure that the document is accessible to people with disabilities and that it is compatible with previous versions of Microsoft Word.
You might also like to view...
A restore point is a snapshot of your computer settings, essentially a backup of the ____.
A. Windows Registry B. Windows Image C. Windows Restore D. Windows Ghost
When creating a multitable query, in the top section of the query design, you use ________ lines to connect common fields in related tables
A) connection B) relationship C) common field D) join
Windows Firewall with Advanced Security is a Microsoft Management Console (MMC) ________ that enables you to configure comprehensive firewall rules specifying conditions for external connection to your computer
a. Snap-in b. Property c. Setting d. None of the above
AC Case 4-1Coach Rodriguez is the head swimming coach for a team made up of four high schools. She manages the student information in an Access database. In preparation for their district meet, she would like to create queries to help her look at the data in different ways. To create a select query, Coach Rodriguez will click the Query Wizard button which is in the Queries group on the ____ tab.
A. File B. Home C. Create D. Query Tools