1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
TEA [102]
4 years ago
5

When you exit an office app, if you have made changes to a file since the last time the file was saved, the office app displays

a dialog box asking if you want to save the changes you made to the file before it closes the app window.â?
Computers and Technology
1 answer:
Lubov Fominskaja [6]4 years ago
4 0
<span>Yes, it is true that if we exit an office app we prompted by one dialog box that we want to save the changes to the file or not.It is one of the good option in Microsoft office product if we close the file accidentally it will display the dialog box to choose the options.In that dialog box if we click save changes button it will save the changes what we made new into the file.Then if we click don't save changes button it won;t make any new changes into the file.If we click cancel button it will return to the page we are working on it.</span>
You might be interested in
The physical address assigned each network adapter is called its ________.
zysi [14]
MAC address
....................
5 0
3 years ago
According to your textbook, which of the following is a consequence of the quick development of new technologies in the digital
kramer

Answer:

E. Traditional leaders in communication have lost some control over information                                                              

Explanation:

Due to the quick development of new technologies like Internet, cable etc, traditional leaders in communication have lost some of their control over information. This means that the technological advancement is disruptive for traditional leaders. Following examples are given to elaborate the consequences of advancement in new technology in digital era.

With the establishment of new channels like CNN, Fox News and internet bloggers, the old television network news shows like ABC, NBC lost their audiences.

Email technology has taken on some of the postal service's responsibilities and outperforms attempts to control communication outside national borders. This replaced the postal mail which used to take months to reach the destination.

The Internet and social media websites are transforming the way in which we access and interact with media culture. Before internet most people would watch popular TV shows in  at the time they originally aired it. This  scheduling gave common media interactions at specific times within our society. We still watch these TV shows but now we watch them at our own ease through websites. Using You tube we can upload our own media instead of viewing mainstream television.

8 0
4 years ago
What are 7 good facts on Computer Viruses?
tia_tia [17]
<u><em>Viruses,A tiny program that hacks a computer </em></u>
<u><em>Steals information and personal data.It can disable your laptop.Viruses can be found in malicious sites.Criminals share these viruses to steal data from others.With a firewall,Hackers will be detected.</em></u>
<u><em> </em></u>

<u><em>The general consensus is that there are no good viruses.</em></u>



4 0
3 years ago
I NEED RIGHT ANSWER
jolli1 [7]
1. First normal form:

The first step in normalisation is putting all repeated fields in separate files and assigning appropriate keys to them.

2. Second normal form:

In this stage of normalisation, all non-key elements that are fully specified by something other than the com­plete key are placed in a separate table. Normally, these non-key elements are dependent on only a part of a compound key.

3. Third normal form:

This stage of normalisation enables elimi­nating redundant data elements and tables that are subsets of other tables. The redundant elements are those non-key data elements that are placed in more than one table of the virtual data elements.

3 0
3 years ago
Read 2 more answers
The _____ contains lists of commands used to create presentations.
MrRa [10]

Answer:

The menu bar is correct

Explanation:

EDG2021

6 0
3 years ago
Other questions:
  • Which activity constitutes legal computer activity?
    12·1 answer
  • An example of a current disruptive technology is a?
    9·2 answers
  • With ______________, the cloud provider manages the hardware including servers, storage, and networking components. The organiza
    6·1 answer
  • Using a cell phone while operating a motor vehicle is considered distraction because
    8·1 answer
  • Your co-worker is at a conference in another state. She requests that you
    9·1 answer
  • A PenTester has successfully exploited a remote host on a clients’ network. They want to create a backdoor on the host for futur
    11·1 answer
  • Which of the following is an advantage to using internal databases for​ information? A. Internal information is accurate and com
    5·1 answer
  • How many miss Dragon Ball Abridged?
    5·2 answers
  • The ____ attribute can be used only with input boxes that store text. Group of answer choices type pattern required value
    9·1 answer
  • A retail store stocks two types of shirts A and B. These are packed in attractive cardboard boxes. During a week the store can s
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!