Use the ________ feature to search a document for hidden data or potentially personal data that should not be shared
A) Check Compatibility B) Check Accessibility
C) Check Properties D) Inspect Document
D
Computer Science & Information Technology
You might also like to view...
Which type of key is used if both the sender and the receiver use the same key to encrypt and decrypt messages?
A) private B) public C) symmetric D) cipher
Computer Science & Information Technology
To apply an outline to columns, you must ________ the desired columns
A) aggregate B) condense C) group D) cluster
Computer Science & Information Technology
Comments are automatically entered into the text by clicking Accept.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Routers can implement ____, which increase inter-VLAN security.
A. pruning B. access lists C. trunking D. ILS
Computer Science & Information Technology