1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vedmedyk [2.9K]
3 years ago
7

To remove any hidden days from your document before sharing it, what should you do?

Computers and Technology
1 answer:
Alenkasestr [34]3 years ago
7 0
To remove any hidden data from your document before sharing, you must: click the file tab, click check for issues, and then click protect document.
Hope I helped! (Please give branliest answer if I helped you!!)
❤️- Alishba
You might be interested in
How can I change it to accepted file types: .ppt, .pptx, .xls, .xlsx, .doc, .docx, .zip, .pdf, .accdb, .msg on Inkscape?
Alisiya [41]
Go to file>export as and it will allow you to change it to other files.
7 0
3 years ago
Read 2 more answers
You'd like to change the minimum password length policy in the default domain policy group policy preference (gpo). What's the b
Naya [18.7K]

The best way to change the minimum password length policy is to open the Group Policy Management Console by running gpmc.msc from CLI.

<h3>What is a password policy?</h3>

A password policy refers to a set of rules and standard that are designed and developed by the data security of an organization, so as to enhance computer security and ensure all password meet the minimum requirements such as:

  • Password length
  • Password maximum age.
  • Password combination

In this scenario, the best way to change the minimum password length policy is to open the Group Policy Management Console by running gpmc.msc from CLI.

Read more on password here: brainly.com/question/3404286

#SPJ12

8 0
2 years ago
You can get context-sensitive help information from the code editor by
Drupady [299]
Visual Studio* IDE Code Editor.
8 0
3 years ago
Name the hardware component that performs each of the following functions (1) performs calculation and/or comparisons (2) holds
mariarad [96]
1. The CPU (central processing unit) does the calculations and comparisons that make the computer work. They use millions of transistors to do so.
2. The ROM holds all the programs on the computer. This is most often the "C" drive.
3. The ROM also has the operating system that is used to run the computer.
6 0
3 years ago
Write the definition of a method named add that receives a reference to a Scanner object associated with a stream of input consi
Lisa [10]

Answer:

import java.util.*;

class Main  

{

   public static void main(String[] args)

   {

       System.out.println("Enter integers and 0 to exit");

       Scanner a1=new Scanner(System.in);

       System.out.println(add(a1));

       

   }

  public static int add(Scanner a1)

  {

        int total = a1.nextInt();

          if (a1.hasNextInt())

              {

                 total =total +add(a1);

              }

       return total;

   }

}

Explanation:

The only thing that needs explanation here is hasnextInt. This returns true if entered number is integer and false if entered is not an integer. And rest is as shown in the program.

5 0
4 years ago
Other questions:
  • Transcoding digital videos does not cause a loss of quality. <br> a. True <br> b. False
    9·1 answer
  • Write a C or C program A6p2.c(pp) that accepts one command line argument which is an integer n between 2 and 4 inclusive. Genera
    9·1 answer
  • Which of the four basic functions of a computer refers to the collection of data by a computer?
    11·2 answers
  • A​ ___________ identifies the content and purpose of the​ visual, along with whatever label and number​ you're using to refer to
    15·1 answer
  • Please please please help I beg I'll give brainiest. :(
    5·1 answer
  • )In a vector implementation of a stack ADT, you add an entry to the top of a stack using which vector method?
    13·1 answer
  • Which of the following is an example of a sales promotion?
    7·1 answer
  • What are the common camera hazards? When might you encounter these hazards in your life, and what do you plan to
    14·1 answer
  • Mike logged into a shopping website and entered his username and password. Which protocol will the website use to verify his cre
    15·1 answer
  • Briefly explain how human thinking is mapped to artificial intelligence components
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!