1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Free_Kalibri [48]
4 years ago
12

_____ is a feature that records the changes you make to a document.

Computers and Technology
1 answer:
Sedbober [7]4 years ago
6 0
C, word editor is a feature that records the changes you make to a document
You might be interested in
In which career field, would the computing technology industry Associates CompTIAA+ certification be useful?
laila [671]

Answer:

It technical support specialist

3 0
3 years ago
Tag groups can be nested up to ____ levels deep, with up to _______ tag subgroups under a single parent.
zepelin [54]
Is it a multiple choices problem
3 0
3 years ago
4. What is the package name in which the Scanner class resides?
Ahat [919]
Related Articles. Scanner is a class in java. util package used for obtaining the input of the primitive types like int, double, etc. and strings.
7 0
3 years ago
Write a function named printtriangle that receives a parameter that holds a non-negative integer value and prints a triangle of
NemiM [27]
Static void PrintTriangle(int n){    for(;n>0;n--) {                Console.WriteLine(new String('*', n));    }}
5 0
3 years ago
A threat actor has successfully breached the network firewall without being detected by the IDS system. What condition describes
Mamont248 [21]

Answer:

false negative

Explanation:

A false negative is a dangerous state in which the IDS (Intrusion Detection System) assumes the activity as acceptable in which the activity is actually an attack occurred on the system.

That means, the Intrusion Detection System has failed to catch the attack. This is the most dangerous state, as the systems were compromised and the network or cyber security people were unable to find the attack.

More generally, there are two types of Intrusion Detection Systems ( IDS ). Network based IDSs ( NIDS ) and Host based IDSs ( HIDS ).

5 0
4 years ago
Other questions:
  • to create an app for a mobile device, yourself, you would use BLANK software like Swift, Corona or Scratch.
    13·1 answer
  • Jamie works on a spread sheet in which he has to label stes of data. How can he navigate between the cells in the spread sheet
    8·1 answer
  • You are the manager and two employees are having issues with each other. These issues are affecting their happiness and producti
    11·1 answer
  • Marjorie is a 72-year-old woman who is having difficulties with cooking and bathing. Jorge provides Marjorie with tools and tech
    12·1 answer
  • Crack the secret message: Crrp, Crrp, Crrp Zh’uh jrlqj wr wkh prrq. Li brx zdqw wr wdnh d wuls, Folpe derdug pb urfnhw vkls. (hi
    7·1 answer
  • Secops focuses on integrating the need for the development team to provide iterative and rapid improvement to system functionali
    14·1 answer
  • The Internet has made going global easier than it has ever been, but the promise of "borderless commerce" remains restrained bec
    12·1 answer
  • Piers wants to take a course on XML. He is a certified web designer, but he has not used XML before. How can he use XML to impro
    8·1 answer
  • Think of some ways you could use Excel at home. Describe one example of something in your life that could be improved or more ea
    14·1 answer
  • The four differences between binary and denary​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!