You use the ________ to find information that you may not want others to see

A) Privacy Inspector B) Presentation Checker
C) Privacy Checker D) Document Inspector


D

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. NTFS not only manages files, handles large disk spaces, but also incorporates additional robustness features required by corporations and businesses. 2. You must indicate in some way which Windows file system your computer uses when you boot the system. 3. The formatting process writes a pattern of sectors on the diskette surface, may record a copy of the boot routine on the first sector, and initializes key data files. 4. A Windows file name is limited to 8 characters. 5. Under Windows, long file names can be up to 128 characters long.

Computer Science & Information Technology

Which is not a valid range?

A) A1:A9 B) A1:A3, B1:B3 C) A1:F9 D) A1:F1

Computer Science & Information Technology

In the early 1980s, the IEEE began work on developing computer network architecture standards. Its work was called ____.

A. WLAN B. Wi-Fi C. Project 802 D. WiMAX

Computer Science & Information Technology

A router directs messages based on the destinations’

a. Layer 1 address b. Layer 2 address c. Layer 3 address d. Layer 4 address

Computer Science & Information Technology