1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
12345 [234]
3 years ago
8

11. In Microsoft Word, when you highlight existing text you want to replace, you're in

Computers and Technology
1 answer:
iren2701 [21]3 years ago
6 0
I eblive you would be in insert mode
You might be interested in
Write a function named repeat_words that takes two string parameters: 1. in_file: the name of an input file that exists before r
madam [21]

Answer:

#section 1

def repeat_words(firstFile, secondFile):

   infile_1=open(firstFile,'r')

   content1=infile_1.read()

   infile_1.close()

#section 2

   import string

   newContent=""

   for char in content1:

       newContent+=char.strip(string.punctuation)

   newContent=newContent.lower()

   newContent=newContent.split()

#section 3

   repeated_list=[]

   for word in newContent:

       if newContent.count(word)>1:

           repeated_list.append(word)

#section 4

   new_repeat_list=[]

   for item in repeated_list:

      while item not in new_repeat_list:

         new_repeat_list.append(item)

#section 5

   outfile=open(secondFile,'w')

   for repeat in new_repeat_list:

       outfile.write(repeat)

       outfile.write('\n')

   outfile.close()

   infile_2=open(secondFile,'r')

   content2=secondFile.read()

   infile_2.close()

   return content2

# section 6

in_file = 'aa.txt'

out_file = 'cpu.txt'

print(repeat_words(in_file, out_file))

Explanation:

#section 1

it defines a function that takes two arguments. It opens the first argument in the read mode and stores all it's content in a string variable "content1". finally the file is closed.

#section 2

In this section the string module is imported which allows for easy manipulation of string variables.

A new string variable is created that would store the already stripped file.

<em>strip(string.punctuation)  </em>strips every character of any leading or trialing punctuation.

<em>lower()  </em>converts string to lover case.

<em>split() </em>converts a string to an array of sub-string, i.e an array of words.

#section 3

This section collects all the words in the array and places them in a list.

#section 4

Utilizes a For and a While loop to ensure that no word repeats and stores it in a new list.

#section 5

Opens a new file and writes all the content into that new file and then closes the file.

re-opens the file, reads and returns the content of the file.

# section 6

This is added in order to test the function and print the result

I used your question to test the function and attached the result.

cheers!

8 0
3 years ago
Which of the following statements will ivoke the function get_course and store the reutrn values correctly? A. get_course(course
Sergio039 [100]

Answer:

Option D is the correct answer for the above question

Explanation:

Missing code: The function code is missing in the question, which defined the two return value.

Detailed Expalanation:

  • The above question code is in python language, which returns the two values. So there are needs of two variable which is needed to hold the returned value from a function.
  • Options b and c both states the two variable for the calling function which needs to hold the returned value and the option D states both option, hence it is a correct option while the other is not because:-
  • Option a states no variable which can hold the returned value.
4 0
3 years ago
You’ve received a tarball called data79.tar from a colleague, but you want to check the names of the files it contains before ex
Nina [5.8K]

Answer:

D. tar rvf data79.tar

4 0
3 years ago
A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
uysha [10]

Answer:

Security Tab is the correct answer.

Explanation:

The Security Tab will enable the users to authorize anyone to use that file or directory.Many clients deleted the security tab because After that nobody can alter the security privileges on the device.

  • With the help of the Security tab, we will minimize the ActiveX attacks on Internet Explorer. This option is available in the Internet Options of the dialog box.
  • Other options are incorrect because they are not related to a given scenario.
8 0
3 years ago
Consumers may receive an​ e-mail, supposedly from their bank or credit card​ company, saying that their​ account's security has
Gnom [1K]

Answer:

Phishing

Explanation:

Phishing is a term used when a person fraudly or illegally uses a digital communication channel i.e. emails, by using the name of some reputed company or banks to get another person's personal data i.e login credentials, credit card details by telling them to log in the webpage given by them.

Phishing is one of the most happening cybercrimes which uses Email as their medium to reach the other person whose data they want to steal. Phishing is one of the terms of hacking.

6 0
3 years ago
Other questions:
  • Case Project 10-1 As the network administrator for a growing company, you’re asked to solve a remote access dilemma. The 12 empl
    8·1 answer
  • Austin works as a department head and frequently uses presentations to deliver information to his staff. He relies heavily on pr
    5·2 answers
  • Drag the tiles to the correct boxes to complete the pairs. Match the tools that you can use while solving a problem with their c
    6·2 answers
  • The GaVS resource where students can locate information regarding Canvas, student email, registration and O365 is called the: St
    6·1 answer
  • The ____ computing device had a memory capacity of 72 numbers and could be programmed to perform a 23-digit multiplication in ju
    6·1 answer
  • Which of the following is a software application program?
    12·1 answer
  • Ethernet is a standard for a) LAN b) MAN c) WAN d) All of the above
    14·2 answers
  • What damage can a virus do to your computer?
    14·1 answer
  • Which two of the following skills are important for a meteorologist
    12·1 answer
  • What G-Suite Apps integrate with Forms
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!