Use the ________ feature to search a document for hidden data or potentially personal data that should not be shared

A) Check Compatibility B) Check Accessibility
C) Check Properties D) Inspect Document

D

Computer Science & Information Technology

You might also like to view...

A distributed denial-of-service attack requires zombies running on numerous machines to perform part of the attack simultaneously. If you were a system administrator looking for zombies on your network, what would you look for?

What will be an ideal response?

Computer Science & Information Technology

What is the host rating, and how is it determined?

What will be an ideal response?

Computer Science & Information Technology