1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iren [92.7K]
2 years ago
8

Laura is confused with the spelling of the word pronunciation. She types the word pronunciation. Which feature of the auto corre

ct tool should she use so that the word processor automatically corrects It?
A) Replace
B) Custom Options
C) Reject
D) Accept
Computers and Technology
2 answers:
Dmitry [639]2 years ago
7 0

The correct answer for this question is A. Replace.

larisa [96]2 years ago
5 0
I think this answer is b
You might be interested in
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the f
Roman55 [17]

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

8 0
2 years ago
A data analyst creates a data frame with data that has more than 50,000 observations in it. When they print their data frame, it
Alexandra [31]

A list is an R-object that can have a wide range of different items inside of it, including vectors, functions, and even another list.

The head() function lets you display the first observations in a data frame. The method tail() prints the final observations in your data collection in a manner similar to that. Both head() and tail() print a top line called the 'header', which contains the names of the distinct variables in your data collection. The R language's transform() function is used to alter data. The first parameter is transformed into a data frame. A suitable variable name comprises of letters, numbers and the dot or underline characters. The variable name does not begin with a number but rather with a letter or a dot.

Learn more about variable here-

brainly.com/question/13544580

#SPJ4

7 0
11 months ago
In computer science what are the methods used to protect the information stored by a piece of software called?
Nezavi [6.7K]

Answer:

cryptography

Explanation:

cryptography

In computer science, cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are hard to decipher

3 0
2 years ago
What is “GoF” and how does it relate to design patterns?
tatuchka [14]

Answer:

GOF refers to the gang of four pattern that are generally consider the basic for all the other patterns. Design pattern are basically provide the solution to the software design to resolve all problems that are associated with the development of real world applications.

GOF Design pattern implemented the parts of the re-usable object oriented software applications. The main aim of design pattern is to pass all the structural design pattern. Design pattern is the most powerful and helpful tool for the software developer and architecture.  

3 0
2 years ago
What is technology? Technology advantages and disadvantages
Alisiya [41]

Explanation:

Technology is a method or skill of utilizing scientific information to reach the goals that include computers, machines and also different techniques.

Advantage of using technology

  • Information can be quickly stored and shared very easily.
  • Technology is used in all companies and businesses to achieve the tasks in a short period with efficiency,
  • Technology has reduces the human errors that have helped to reduce the work stress.

Disadvantages of using technology

  • Corruption and terrorism have increased due to advancements in technology.
  • with the help of technology, digital and data manipulation is done.
  • Too much connected or dependent on technology can cause several psychological problems such as narcissism,depressions, distraction.
  • Using too much of technology can affect physical health such as vision problems, hearing problems, neck strain.

3 0
3 years ago
Other questions:
  • Need Help !!! Please
    8·1 answer
  • A ____ is a type of program that uses a grid to organize and work with data.
    14·1 answer
  • After you enter the details for the first selected recipient in the New Address List dialog box, click _______ to add another re
    9·1 answer
  • Which of the following is a requirement for the Safety Data Sheet (SDS)?​
    5·1 answer
  • What is a boolean in Java
    5·1 answer
  • If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo
    11·2 answers
  • Array testGrades contains NUM_VALS test scores. Write a for loop that sets sumExtra to the total extra credit received. Full cre
    11·1 answer
  • Http://www.alegrium.com/sgi/2/eibder
    5·1 answer
  • How is a UDP socket fully identified? What about a TCP socket? What is the difference between the full identification of both so
    9·1 answer
  • Hello, I've tried everything and I cannot get this code to be fair. I need help. Can someone provide guidance so I can understan
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!