Use the ________ feature to search a document for hidden data or potentially personal data that should not be shared
A) Check Compatibility B) Check Accessibility
C) Check Properties D) Inspect Document
D
Computer Science & Information Technology
You might also like to view...
A distributed denial-of-service attack requires zombies running on numerous machines to perform part of the attack simultaneously. If you were a system administrator looking for zombies on your network, what would you look for?
What will be an ideal response?
Computer Science & Information Technology
What is the host rating, and how is it determined?
What will be an ideal response?
Computer Science & Information Technology