1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
777dan777 [17]
4 years ago
9

At your job, you often have to address letters to the customer support manager, Tyson Kajewski. The problem is that you are cons

tantly misspelling her last name Kajewksy. Which of the following Word features would probably be the easiest way to handle this problem?
Computers and Technology
1 answer:
krek1111 [17]4 years ago
5 0
Input his name in the dictionary function, you can also copy the given name an paste as much as you need
You might be interested in
Sending a busy manager a long email represents a problem in which area of the communication process
FromTheMoon [43]
Time management,they wouldn’t have enough time to read it and they would become more stressed out
3 0
4 years ago
While a threat intelligence analyst was researching an indicator of compromise on a search engine, the web proxy generated an al
inna [77]

Answer: the corret answer C. The analyst has prefetch enabled on the browser in use.

Explanation:

The analyst has like an indicator which is prefetch enabled on the browser in use.

7 0
3 years ago
A technician is dispatched to install additional RAM in a computer. The technician unplugs the system from the power source, and
xz_007 [3.2K]

Use an anti-static bag to hold the RAM while installing.

6 0
4 years ago
If you were an attacker who wanted to gain access to a network, would you focus on breaching technical controls for applying soc
katrin2010 [14]

Answer:

Baiting. As its name implies, baiting attacks use a false promise to pique a victim's greed or curiosity. ...

Scareware. Scareware involves victims being bombarded with false alarms and fictitious threats. ...

Pretexting. Here an attacker obtains information through a series of cleverly crafted lies. ...

Phishing. ...

Spear phishing

Explanation:

thank me later

7 0
3 years ago
While configuring a wireless access point device, a technician is presented with several security mode options. Which of the fol
V125BC [204]

Answer:

Bro this is my area the answer is WPA2 and AES  

Explanation:

its because AES is a more secure encryption protocol introduced with WPA2. AES isn't some creaky standard developed specifically for Wi-Fi networks, either. It's a serious worldwide encryption standard that's even been adopted by the US government.

7 0
3 years ago
Other questions:
  • When sociologists say that it is difficult to predict all the results of social change, what are they referring to?
    5·1 answer
  • Adam discovers a virus on his system that is using encryption to modify itself. the virus escapes detection by signature-based a
    14·1 answer
  • What are examples of educational obstacles to a career plan?
    13·1 answer
  • Which of the following statements is true of intrapreneurs
    15·1 answer
  • Images from your .............. can be copied and pasted in a folder on your computer ​
    8·1 answer
  • in java Write a program with total change amount in pennies as an integer input, and output the change using the fewest coins, o
    13·1 answer
  • One condition for deadlocks is the circular-wait condition. One way to ensure that this condition never holds is to impose a tot
    12·2 answers
  • Which of these allows the programmer to put data inside a variable?
    5·1 answer
  • The memory used by the CPU to temporarily hold data while processing is called _______. random access memory central processing
    5·1 answer
  • In cyber security, one of the best ways to protect a computer or network is with a strategy called defense in depth. This strate
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!