A command that searches your document for hidden data or personal information that you might not want to share publicly

a. Synchronization
b. Trusted Documents
c. Inspect Document


C

Computer Science & Information Technology

You might also like to view...

The Linux operating system uses _________ entropy sources for generating random numbers.

A. four B. three C. one D. two

Computer Science & Information Technology

A(n) ________ can be used to organize your slides similar to using folders to organize your files

Fill in the blank(s) with correct word

Computer Science & Information Technology

What should you do if you want to be able to locate your laptop in the event of loss or theft and give it a command through the Internet to lock it or delete data?

A. Subscribe to LoJack for Laptops B. Set a BIOS supervisor and user password C. Enable the GPS module in the BIOS/UEFI D. Enable the TPM chip in the BIOS/UEFI

Computer Science & Information Technology

The Bold and Underline buttons are found in the Font group on the Home tab of the Ribbon. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology