Use the ________ feature to search a document for hidden data or potentially personal data that should not be shared

A) Check Compatibility B) Check Accessibility
C) Check Properties D) Inspect Document


D

Computer Science & Information Technology

You might also like to view...

Which type of key is used if both the sender and the receiver use the same key to encrypt and decrypt messages?

A) private B) public C) symmetric D) cipher

Computer Science & Information Technology

To apply an outline to columns, you must ________ the desired columns

A) aggregate B) condense C) group D) cluster

Computer Science & Information Technology

Comments are automatically entered into the text by clicking Accept.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Routers can implement ____, which increase inter-VLAN security.

A. pruning B. access lists C. trunking D. ILS

Computer Science & Information Technology