1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr-060686 [28]
2 years ago
11

Which button could Pamela press in the Microsoft Word spell checker to make the word “colour” instantly change to “color” whenev

er she types it in each new document?
Computers and Technology
1 answer:
Norma-Jean [14]2 years ago
5 0
She could right click her mouse to select the correct word to add it into her dictionary.
You might be interested in
Kylee needs to ensure that if a particular client sends her an email while she is on vacation, the email is forwarded to a cowor
STALIN [3.7K]

Answer: Configure a response for external senders.

Explanation:

Since Kylee wants to ensure that when a particular client sends her an email while she is on vacation, then the email will be forwarded to a coworker for immediate handling, then she should configure a response for external senders.

It should be noted that the response will not be configured for internal senders as it isn't from a co-worker but rather meant for a client. Therefore, the correct option is A.

6 0
2 years ago
Free brainliest!?! <3​
Sholpan [36]

Meee plzzzzz First!............

4 0
2 years ago
Read 2 more answers
How can you tell the value of a purchase?
ZanzabumX [31]
Look at the price tag
find the item on ebay to see what other are selling it for


8 0
2 years ago
There are _______ bits to every byte.
MrMuchimi

8. according to Google, 1 byte = 8 bits

7 0
2 years ago
Read 2 more answers
What type of authentication does the dod require to access sensitive data on mobile devices and/or e-mail?
motikmotik
<span>Actually dod requires a digital type of authentication and a secure password inorder to access sensitive data on mobile devices and email, which may in the form of two step authentication code, then in the form digital phone calls, and then in the form of alphanumeric passwords and finally in the form of finger prints authentications or face recognition verification..</span>
8 0
3 years ago
Other questions:
  • A security policy is a
    11·1 answer
  • I have a cosmetology essay due in 2 hours and i’m still on the research , please help .
    13·1 answer
  • You are configuring IP settings on a new network. For the external interfaces, you decide to obtain registered IP addresses from
    5·1 answer
  • Encryption Using Rotate Operations Write a procedure that performs simple encryption by rotating each plaintext byte a varying n
    10·1 answer
  • .in the array based list implementation of the ADT what is the worst case time efficiency of the remove method?
    6·1 answer
  • PLEASE HELP ME ANSWER AS MUCH AS YOU CAN I ONLY HAVE 3 POINTS LEFT AND IM TIMED. PLEASE TELL ME THE NUMBER AND LETTER. THANK YOU
    5·1 answer
  • You just bought a hard drive, you plan on using this a secondary storage, once installed, what needs to be done to the drive and
    6·1 answer
  • What was your learning target for today
    9·2 answers
  • Write a format operation that builds a string for the float variable amount that
    11·1 answer
  • Types of digital divide ​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!