1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
notsponge [240]
3 years ago
8

To remove any hidden data from your document before sharing it you should:

Computers and Technology
2 answers:
Bond [772]3 years ago
6 0

Yeah i agree it is not have to delete hidden data
NikAS [45]3 years ago
3 0
Not have to delete hidden data
You might be interested in
Which information is required when designing a field? check all that apply.
Alex_Xolod [135]

Answer:

Explanation:

dimensions or calculation

3 0
2 years ago
Today's consoles and games have audio features that rival cinematic audio.<br> True or False?
Angelina_Jolie [31]

Answer:

true

Explanation:

4 0
2 years ago
Read 2 more answers
List 3 characteristics of the ideal encryption scheme
JulsSmile [24]
Three characteristics of an ideal encrytion scheme are:
1. The encryption sheme should be strong: the algorithm is imprevious to direct attack and attempts are derived.
2. The encryption scheme should create unique ciphertext from the same plaintext for each key permutation, among other traits.
3. It should take at least millions of years to break ideal encryption scheme, based on mathematical predictions.
6 0
3 years ago
Read 2 more answers
A program virus infect​
Darya [45]

Explanation:

Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed.

MARK AS BRAINLIST IF IT IS USEFUL

7 0
3 years ago
The name atari comes from what
algol [13]

Answer:

JAPANESE

Explanation:

Have a nice day:)

3 0
3 years ago
Other questions:
  • PLEASE HURRY What data unit is addressed based on the IP address of the recipient? a. packet b. frame c. segment d. section
    9·2 answers
  • To change a selected shape’s height or width to a specific value, type the value in the Height or Width text boxes on the
    14·1 answer
  • True or false. Every word has only one correct spelling and pronunciation.
    6·1 answer
  • You've been asked to find the largest number in a range of numbers. Which of the following could you use to find the largest num
    8·1 answer
  • 50 Points! 25 Points Each! Please help ASAP! Will mark brainliest! See attached image.
    10·2 answers
  • Solve a single producer, single consumer problem using wait() and notifyAll(). The producer must not overflow the shared buffer,
    5·1 answer
  • ______ are used to store all the data in a database.
    7·1 answer
  • Write a static method named contains that accepts two arrays of integers a1 and a2 as
    14·1 answer
  • The ______________ shows that you have fully researched the topic and gives you a chance to prove your claim.
    8·1 answer
  • MATH PLZ HELP ITS DUE IN 4 MINUTES​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!