1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa [10]
3 years ago
8

The recheck document button, which resets the spelling and grammar checker to flag previously ignored errors, is located in the

________. Question 2 options:
a.Navigation pane
b.Proofing group of the review tab
c.Word options dialog box
d.Tracking group of the review tab
Computers and Technology
1 answer:
kumpel [21]3 years ago
7 0
The answer is b and c
You might be interested in
Which function of NOS involves swapping programs and files
yaroslaw [1]
The answer is Multitasking. NOS (Network Operating System) has the ability to execute more than one program at a time.  It allows different programs to operate on the CPU, effectively giving each program a virtual copy of the CPU while preventing the program from directly manipulating the hardware. The NOS switches the CPU time from one task  to another in order to create the idea that several tasks are being executed at the same time, but in reality, only one program is being executed. 
6 0
2 years ago
There is a development team delivering a new software package with agile and devops frameworks. in one of the releases, the auto
Olin [163]

A practice that should be implemented in the aforementioned situation is to separate the Agile and DevOps software development framework.

<h3>What is a unit test?</h3>

A unit test can be defined as an automated test that's typically written and run by a software developer, so as to ensure that a section (component) of a software application meets its design specifications, functionalities and requirements.

In this scenario, a practice that should be implemented by the software developer is to separate the Agile and DevOps software development framework.

Read more on unit test here: brainly.com/question/22900395

#SPJ1

4 0
2 years ago
Read 2 more answers
In addition to compiling the list of user access requirements, applications, and systems, the BIA also includes processes that a
laila [671]

Answer:

automated

Explanation:

Basically a Business Impact Analysis (BIA) estimates and determines the effects of a business activity and process disturbances. These disruptions can be natural or electronic disasters. It also collects information which is used to establish recovery plan. It identifies the business vulnerabilities and works on the strategies in order to reduce such potential hazards. The BIA involves both manual and automated processes. BIA involves automated processes which include the automated software tools that enables the protection of the confidential information of the users and also generates automated reports about the critical business processes.

5 0
3 years ago
We want to implement a data link control protocol on a channel that has limited bandwidth and high error rate. On the other hand
Korolek [52]

Answer:

Selective Repeat protocols

Explanation:

It is better to make use of the selective repeat protocol here. From what we have here, there is a high error rate on this channel.

If we had implemented Go back N protocol, the whole N packets would be retransmitted. Much bandwidth would be needed here.

But we are told that bandwidth is limited. So if packet get lost when we implement selective protocol, we would only need less bandwidth since we would retransmit only this packet.

6 0
3 years ago
A(n) ____ is a computer that requests and uses network resources from a(n) ____.
Crazy boy [7]

A(n) client exists a computer that requests and utilizes network resources from a(n) server.

<h3>What is a computer network?</h3>
  • A computer network is a collection of computers that share resources that are available on or provided by network nodes.
  • The computers communicate with one another via digital links using standard communication protocols.
  • These links are made up of telecommunication network technologies that are based on physically wired, optical, and wireless radio-frequency means and can be configured in a variety of network topologies.
  • Nodes in a computer network can be personal computers, servers, networking equipment, or other specialized or general-purpose hosts.
  • They can be identified by network addresses and have hostnames.
  • Local-area networks (LANs) and wide-area networks (WANs) are the two basic network types.
  • A(n) client exists a computer that requests and utilizes network resources from a(n) server.

To learn more about computer network, refer to:

brainly.com/question/8118353

#SPJ4

6 0
11 months ago
Other questions:
  • In round-robin scheduling,a) the time quantum should be larger than the context switch time. b) the time quantum should be as sm
    15·1 answer
  • Difference between volatile and non volatile memory
    14·2 answers
  • Select
    14·1 answer
  • Write a program in Python that reads in investment amount, annual interest rate, and number of years, and displays the future in
    6·1 answer
  • In a non-formatted/standard template, if the number 25 is converted to text format, the
    14·1 answer
  • Diane is receiving a lot of unwanted e-mail. What steps can she take to reduce the amount of e-mail she receives?
    12·1 answer
  • If you design your pages using a font that your user does not have installed, the browser defaults to ____ on a macintosh.
    13·1 answer
  • Most airlines use very modern hardware and software.<br><br><br> True<br><br> False
    9·1 answer
  • Date
    6·1 answer
  • 3 ways that can be used to connect computers to a network
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!