The ________ can be used to ensure that hidden data or personal information is not included with a presentation

A) Presentation Inspector
B) Document Inspector
C) Personal Information tool
D) Properties dialog box


B

Computer Science & Information Technology

You might also like to view...

What option combined with the Kill command will make it considered stronger?

A. -9 B. -1 C. 0 D. 10

Computer Science & Information Technology

When reports are built from parameter queries, running the report yields different results depending on the parameter value entered

Indicate whether the statement is true or false

Computer Science & Information Technology

What is the installation of a new file system on a device known as? Describe this process.

What will be an ideal response?

Computer Science & Information Technology

Which of the following is a file extension that indicates the file type of application in a Windows environment?

A. ocx B. app C. ini D. exe

Computer Science & Information Technology