1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Damm [24]
3 years ago
6

The difference between an AutoCorrect entry and a building block is that the building block feature makes corrections automatica

lly as soon as the SPACEBAR or a punctuation key is pressed, whereas the F3 key must be pressed or the AutoCorrect command clicked to instruct Word to make an AutoCorrect correction.
Computers and Technology
1 answer:
Bond [772]3 years ago
5 0

Answer:

False.

Explanation:

The function of Building Blocks, that contains AutoText which is a helpful tool for incorporating a bulk of info into Word. For ease of access, the user could maybe create building blocks usable throughout the Quick Parts menu well into the Insert tab.

So, we can say that there is no major difference between autocorrect and building block, that's why the following statement is false.

You might be interested in
1. Name the three kinds of Eraser in Photoshop. <br>​
antiseptic1488 [7]

Answer:

the Eraser, Background Eraser, and Magic Eraser.

Explanation:

the Eraser, Background Eraser, and Magic Eraser.

5 0
2 years ago
Read 2 more answers
Rerouting traffic using arp poisoning is an attack on ________ of a network.
Arada [10]
Rerouting traffic using ARP poisoning is an attack on both the functionality  and confidentiality of a network. This is also known as ARP spoofing. This type of attack takes a legitimate IP address of another host and causes traffic redirection to an infected page. 
5 0
3 years ago
4-One possible performance multiplication enhancement is to do a shift and add instead of an actual multiplication. Since 9 * 6,
pychu [463]

Answer:

Check the explanation

Explanation:

The above question can be sovled in the below step by step way:

15 can be written as 16-1 = 24 -1

Therefore, 15 *13 = (24 -1)*13

= 13*24 - 13

Now, when we left shift a number we multiply it by 2k .Where k is no of times we left shifted it.

Therefore, 13*24 = shift 13 to left 4 times

15 * 13 = shift 13 to left 4 times and subtract 13 from it.

3 0
3 years ago
An agile team has which two characteristics? (choose two. ).
DerKrebs [107]

A SAFe Agile teams are often known to be Scrum Master and Product Owner. An Agile team characteristics are:

  • A small group typically 5 - 11 dedicated individuals who have the skills necessary to define, build, test, and deploy increments of value.

  • A group of dedicated individuals who are empowered, self-organized, self-managing, and deliver value.

A SAFe Agile team is a cross-functional group  as they are made up of about of 5-11 people who set apart, build, test, and deliver an increment of value in a short time box.

Agile team are known to be cross functional as they can define, build , test and Deploy.

See full question below

An Agile team has which two characteristics? (Choose two.)

A) A small group typically 5 - 11 dedicated individuals who have the skills necessary to define, build, test, and deploy increments of value

B) A stand-along unit of individuals who do not require input fro other teams to complete their tasks

C) A large group of individuals who all work together to create value for the client

D) A group of dedicated individuals that work in phase-gate steps to complete their PI Objectives

E) A group of dedicated individuals who are empowered, self-organized, self-managing, and deliver value

Learn more from

brainly.com/question/24390635

5 0
3 years ago
The set of three integer values for the lengths of the sides of a right triangle is called a Pythagorean triple. These three sid
Sloan [31]

Answer:

In Python:

def  Pythagorean_triple(hyp,side1,side2):

   if hyp**2 == side1**2 + side2*2:

       return True

   else:

       return False

               

print("Hypotenuse\tSide 1\t Side 2\t Return Value")

for i in range(1,501):

   for j in range(1,501):

       for k in range(1,501):

           print(str(i)+"\t"+str(j)+"\t"+str(k)+"\t"+str(Pythagorean_triple(i,j,k)))

Explanation:

This defines the function

def  Pythagorean_triple(hyp,side1,side2):

This checks for pythagorean triple

   if hyp**2 == side1**2 + side2*2:

Returns True, if true

       return True

   else:

Returns False, if otherwise

       return False

               

The main method begins

This prints the header

print("Hypotenuse\tSide 1\t Side 2\t Return Value")

The following is a triple-nested loop [Each of the loop is from 1 to 500]

for i in range(1,501): -->The hypotenuse

   for j in range(1,501): -->Side 1

       for k in range(1,501):-->Side 2

This calls the function and prints the required output i.e. the sides of the triangle and True or False

           print(str(i)+"\t"+str(j)+"\t"+str(k)+"\t"+str(Pythagorean_triple(i,j,k)))

8 0
3 years ago
Other questions:
  • Mike is reading about machine-dependent programming languages. Which languages are machine-dependent programming languages?
    11·1 answer
  • To resize columns in a subform, press and hold or right-click the subform in the navigation pane, and tap or click ____ on the s
    12·1 answer
  • Which of the following statements is false? People tend to shortcut security procedures because the procedures are inconvenient.
    13·1 answer
  • The IP protocol (and UDP) are called "connectionless" and "unreliable." Describe what those two words mean in the context of dat
    8·1 answer
  • Your organization uses a type of cryptography that provides good security but uses smaller key sizes and utilizes logarithms tha
    9·1 answer
  • What is the full meaning of Internet and WiFi
    6·2 answers
  • What is abbreviation of the computer​
    15·2 answers
  • Your network has been having problems lately when users are participating in video conferences - the video and audio stutters ve
    13·1 answer
  • This isn't an academic question, but can anyone help me change the face on my apple watch to a picture from my camera roll? I've
    15·1 answer
  • A friend of mine had a samsung j2 phone and someone with a iphone placed something in her phone she thought was malware in her p
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!