1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexxx [7]
3 years ago
11

You send a report to your boss for feedback and she returns it to you with her edits noted in the electronic file. This Word fea

ture is called
Computers and Technology
1 answer:
Novay_Z [31]3 years ago
7 0
Markup. edits noted in the electronic file
You might be interested in
Where should a user disable virus protection settings that might prevent the boot area of the hard drive from being altered?
leonid [27]

Answer:BIOS setup

Explanation:

BIOS setup is a program used alter or changes the settings of a computer hardware system,it is in the BIOS setup that the user of a company system can disable the Virus and other forms of protection which prevents the system from performing efficiently. To gain access to the BIOS setup one has to turn off the system and wait for up to 5seconds before turning on,press the Esc key constantly for some time until the Start up menu opens then press the F10 to gain access to the BIOS setup.

3 0
3 years ago
Which factors have increased the need for the latest cybersecurity technologies?
coldgirl [10]

The factors have increased the need for the latest cybersecurity technologies are A. smaller targets, C. customized threats.

<h3>What are the cybersecurity?</h3>

Cybersecurity is the safety of internet-related structures which include hardware, software program and records from cyber threats. The exercise is utilized by people and organizations to defend towards unauthorized get admission to to records facilities and different automated structures.

Cyberattacks can goal a huge variety of sufferers from character customers to organizations or maybe governments. When focused on groups or different organizations, the hacker's aim is normally to get admission to touchy and precious enterprise resources, which include highbrow property (IP), client records or price details.

Read more about the cybersecurity technologies:

brainly.com/question/26260220

#SPJ1

7 0
2 years ago
Abby wants to simply share a snapshot of her calendar with another user. Which option should she choose to achieve this
Papessa [141]

Answer:

Screenshot

Explanation:

Just a guess

8 0
3 years ago
Read 2 more answers
What is essential to meet project deadlines and deliver work on schedule?
Murljashka [212]
Time management is very essential
5 0
3 years ago
Choose the correctly written sentence.
Lemur [1.5K]

Answer:

i would say the first one

Explanation:

7 0
2 years ago
Read 2 more answers
Other questions:
  • In the database below, the arrow is pointing to a _____.<br> file<br> record<br> field<br> key field
    12·1 answer
  • What is meant by backing up files through cloud computing?
    5·2 answers
  • Type the correct answer in the box. Spell all words correctly. What type of network is the Internet? The Internet is an example
    13·1 answer
  • Who created the first photograph
    9·2 answers
  • Historically, storytelling passed down the most important ideas about life, family, and society from generation to generation; t
    10·2 answers
  • 1) You are working with an organization as a network manager. The organization has
    6·1 answer
  • Which wireless standard runs on both the 2.4 and 5 GHz frequencies?
    11·1 answer
  • Difine the term pigment​
    14·3 answers
  • A large global retail corporation has experienced a security breach, which includes personal data of employees and customers.
    5·1 answer
  • Memorex Disks sells computer disk drives with right-of-return privileges. Returns are material and reasonably predictable. Memor
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!