1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harman [31]
3 years ago
9

To mark all modifications made to the document, activate the _____ feature.

Computers and Technology
2 answers:
tankabanditka [31]3 years ago
7 0
Its Track Changes, I guess.
Thank You!
sertanlavr [38]3 years ago
6 0

Answer:

Track Changes

Explanation:

You might be interested in
Consider the following code snippet:public static void main(String[] args) throws FileNotFoundExceptionWhich of the following st
iVinArrow [24]

Answer:

The main method should simply terminate if the FileNotFoundException occurs.

Explanation:

Considering the full code snippet

snippet:public static void main(String[] args) throws FileNotFoundException

public static void main(String[])

represent the entry point method to a java main method

The addition of

throws FileNotFoundException

widens the scope of the main method to explicitly specifies that an exception named the FileNotFoundException may be thrown.

So, if any part of the code explicitly throws the FileNotFoundException the compiler makes use of this to throw an exception.

By throwing an exception, the main method is not catching any exceptions, instead it handles the FileNotFoundException by throwing it to the source which invoked the main method

This is required by the compiler to terminate the program if the FileNotFoundException occurs.

8 0
3 years ago
What field is used to send a copy of an e-mail message?
vampirchik [111]
The CC field is used to send a copy of an email. CC stands for carbon copy.
7 0
3 years ago
Yuri is a skilled computer security expert who attempts to break into the systems belonging to his clients. He has permission fr
Tatiana [17]

Answer:

b) White-hat hacker

Explanation:

This is also called an ethical hacker. Unlike the other options, a white-hat hacker is a person specialized on computational security which offers services to organizations to test how safe they are from informatic attacks (viruses, theft of information, etc). This is carried out  based on a agreement between the whihte-hat hacker and the client via a contract.  

8 0
4 years ago
Clarity
shutvik [7]

Answer:

1)engagement

2)clarity , consistency , simplicity

3)consistency

4)clarity ,consistency ,simplicity

Explanation:

The answers of the four parts are as mentioned above.

If the game is engaging the interest of the interested players will be retained certainly.

If it is clear, consistent and simple, then you will definitely be able to retain the kind of fun the game will be creating in the intended player audiences.

If its consistent, then the game will certainly require one type of approach.

And if its clear, consistent and simple then the game will be providing the flexibility for the future modification.

Hence the above answer.

7 0
4 years ago
For people who answer other pals questions with wrong answers on purpose
11Alexandr11 [23.1K]

Answer:

I dont try, but sometimes when i get the question wrong i get reported :(

Explanation:

3 0
2 years ago
Other questions:
  • What are the first two lines of defense a company should take when addressing security risks?
    10·1 answer
  • Write a program that uses these bounds and bisection search (for more info check out the Wikipedia page on bisection search) to
    8·1 answer
  • In order for the wavelength of a wave to increase, the frequency must...
    10·1 answer
  • The main purpose of a service panel in a house is to
    11·1 answer
  • Use the drop-down menus to describe how Adnan can add shapes to his presentation.
    11·1 answer
  • What is the preferences of occupation in ones life?
    14·1 answer
  • Please describe the role of games in modern society!
    15·2 answers
  • Question 2 of 3
    7·2 answers
  • Select the correct answer. Which input device uses optical technology?
    5·1 answer
  • I am trying to make a flowgorithm chart for a dogs name, age, weight and when their weight is less than 50 OR more than 100 its
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!