The ________ can be used to ensure that hidden data or personal information is not included with a presentation
A) Presentation Inspector
B) Document Inspector
C) Personal Information tool
D) Properties dialog box
B
Computer Science & Information Technology
You might also like to view...
What option combined with the Kill command will make it considered stronger?
A. -9 B. -1 C. 0 D. 10
Computer Science & Information Technology
When reports are built from parameter queries, running the report yields different results depending on the parameter value entered
Indicate whether the statement is true or false
Computer Science & Information Technology
What is the installation of a new file system on a device known as? Describe this process.
What will be an ideal response?
Computer Science & Information Technology
Which of the following is a file extension that indicates the file type of application in a Windows environment?
A. ocx B. app C. ini D. exe
Computer Science & Information Technology