1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
anygoal [31]
3 years ago
7

As part of his proofreading process, and to catch any spelling or grammar mistakes, John uses this feature in Word Online to hav

e the program read what is on the document.
Computers and Technology
1 answer:
UkoKoshka [18]3 years ago
5 0
Microsoft word online uses “Proofing Tools”, it can check spelling and grammar, translate the document, and set the proofing language. Word for the web does not use a custom dictionary or include a thesaurus.
You might be interested in
Choose the word that matches each definition. : processed facts, how the output is used for making decisions : action performed
Dafna1 [17]

Input devices accept data in a form that the computer can use; they then send the data to the processing unit. The processor, more formally known as the central processing unit (CPU), has the electronic circuitry that manipulates input data into the information people want.

I hope this helps you:)

6 0
3 years ago
Read 2 more answers
Describe the major elements and issues with system prototyping​
vichka [17]

Answer:

Pic attached...

Hope it helps!!!

6 0
2 years ago
Why doesn't brainly give me 15 questions a day
Lilit [14]
I’m not sure how to answer that
8 0
2 years ago
Read 2 more answers
Discuss in detail why you need to use a write blocker (either hardware or software) in your examinations, whether for a criminal
dolphi86 [110]

A write blocker is any tool that permits read-only access to data storage devices without compromising the integrity of the data. A write blocker, when used properly, can guarantee the protection of the data chain of custody. NIST‘s general write blocking requirements hold that:

<span>The tool shall not allow a protected drive to be changed.The tool shall not prevent obtaining any information from or about any drive.<span>The tool shall not prevent any operations to a drive that is not protected.</span></span>
8 0
3 years ago
A(n) ______________ ________________ attack keeps the target so busy responding to a stream of automated requests that legitimat
Tanya [424]

Answer:

denial-of-service (DoS) attacks

Explanation:

8 0
3 years ago
Other questions:
  • What are the requirements of a data dictionary ?
    7·2 answers
  • What file may contain data written to it in case of an unexpected error or program shut-down?
    5·1 answer
  • Csc105 final graded project
    9·1 answer
  • 1. Some of the music in the 1960s was used to protest social and political issues. Is music still used as a form of protest? Why
    13·1 answer
  • Why do you classify computers?
    6·1 answer
  • Select the education and qualifications that are most helpful for business analysis careers. Check all that apply
    11·2 answers
  • Which of the displays could be represented by a single bit?
    12·2 answers
  • What feature is available to add a suggestion in the margin of someone else's document?​
    15·1 answer
  • Match the feature to its function.
    7·1 answer
  • You looked at the methods used to determine database requirements. Now, research and find a database requirements template. Choo
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!