1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elixir [45]
3 years ago
8

An incorrectly spelled word is indicated by _______. a. a red checkmark beside the word b. the word higlighted in yellow c. a re

d line underneath the word d. the word blinking until it is corrected
Computers and Technology
2 answers:
SpyIntel [72]3 years ago
7 0
The correct answer is C! ;D
Eddi Din [679]3 years ago
4 0
C a red line underneath the word 
You might be interested in
Most spyware programs are benign in that they do not perform malicious acts or steal data. group of answer choices true false
inessss [21]

The statement 'most spyware programs are benign in that they do not perform malicious acts or steal data' is false.

In the field of computer studies, spyware is malicious software that is installed inside a system without the knowledge of the user. Such an act is done either to harm the data in the system or to steal information from the system. Spywares invade the privacy of a user and can lead to harmful results.

Spyware can be a serious threat to internet users as it can even track the login credentials of a user. Hence, spyware is not at all benign as it can impose serious threats to a user. Malicious activities and stealing of data are done through spyware.

To learn more about spyware, click here:

brainly.com/question/21507976

#SPJ4

3 0
2 years ago
What occurs when you call a method on a reference variable that contains null? Select one: a. An ArrayIndexOutOfBoundsException
Finger [1]

Answer:

Option(c) i.e "A NullPointerException error " is the correct answer for the given question.

Explanation:

Exception are the run time error in the program.A NullPointerException is the runtime error when the pointer containing the NULL value .This type of exception occur when we call that function on the pointer variable which contains the NULL.

  • ArrayIndexOutOfBoundsException error occur when we accessing the element which is out of the index or bound so this option is incorrect.
  • An ArithmeticException error  occur in the arithmetic operation. Suppose a number is divided by zero then the ArithmeticException error is occured .
  • ClassCastException error occur in the typecasting of a specific object.So this option is incorrect.
5 0
3 years ago
OSI is a seven-layered framework used to help define and organize the responsibilities of protocols used for network communicati
sergejj [24]

Answer:

True.

Explanation:

OSI network model is a networking framework that has seven layers that describes the encapsulation and communication of devices in a network. The seven OSI model layers are, application, presentation, session, transport, network, data-link and physical layer.

Each layer in this model describes the protocol datagram unit PDU and identifies several standard and proprietary protocols that can be used in a layer.

A network administrator of engineer can decide to use a protocol based on his choice and the brand of network device used.

8 0
3 years ago
Importance of type casting in programming ​
chubhunter [2.5K]

Answer:

Typecasting, or type conversion, is a method of changing an entity from one data type to another. It is used in computer programming to ensure variables are correctly processed by a function. An example of typecasting is converting an integer to a string.

mark me brainliesttb :))

4 0
3 years ago
Under which key category do the Page Up and Page Down keys fall?
Fiesta28 [93]
They are called the navigation keys
7 0
4 years ago
Read 2 more answers
Other questions:
  • If you will be giving your presentation to an audience, you can practice your presentation by using View, ___________, to rehear
    14·1 answer
  • Which of the following is true of how the Internet has responded to the increasing number of devices now using the network?
    7·1 answer
  • What are the pros and cons of using a linked implementation of a sparse matrix, as opposed to an array-based implementation?
    11·1 answer
  • You are asked to check your company’s configurations to determine if any filters should be built to stop certain ICMPv6 traffic.
    9·1 answer
  • What is cyber ethics​
    10·2 answers
  • Int a = 1; int b = 0; int c = -1; if ((b + 1) == a) { b++; c += b; } if (c == a) { a--; b = 4; }
    7·1 answer
  • The image below shows an encoding for a black and white pixel image. The first two
    13·1 answer
  • Complete the sentence.
    8·1 answer
  • Camila wanted to increase the readability of her company newsletter. To do this, she added _____.
    7·2 answers
  • How to enter date in a Date/Time field?​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!