A command that searches your document for hidden data or personal information that you might not want to share publicly
a. Synchronization
b. Trusted Documents
c. Inspect Document
C
You might also like to view...
The Linux operating system uses _________ entropy sources for generating random numbers.
A. four B. three C. one D. two
A(n) ________ can be used to organize your slides similar to using folders to organize your files
Fill in the blank(s) with correct word
What should you do if you want to be able to locate your laptop in the event of loss or theft and give it a command through the Internet to lock it or delete data?
A. Subscribe to LoJack for Laptops B. Set a BIOS supervisor and user password C. Enable the GPS module in the BIOS/UEFI D. Enable the TPM chip in the BIOS/UEFI
The Bold and Underline buttons are found in the Font group on the Home tab of the Ribbon. _________________________
Answer the following statement true (T) or false (F)