1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksenya-84 [330]
3 years ago
6

Value: 3

Computers and Technology
1 answer:
Citrus2011 [14]3 years ago
4 0

Answer:

B - A word is correctly spelled but is used incorrectly in a document

You might be interested in
HELP ASAP!Select all examples of desirable workplace skills, habits, and attitudes.
ddd [48]

Answer:

does not call in sick or miss work frequently

creates a list of solutions for the boss

arrives at work on time or early

waits for supervisor to give directions

works quickly and accurately

shows initiative

communicates effectively

sets clear goals to achieve success

Explanation:

Have a Great Day!!!

7 0
3 years ago
To insert a footnote in a document, a user would navigate to the _____ tab.
Pachacha [2.7K]

Answer

References tab.

Explanation

In MS word documents, you can add footnotes and endnotes by;

• Clicking the area to add a footnote

• Clicking references, then insert Footnote. The word program will insert a reference mark in the text and will add the footnote mark at the bottom of the page

• Type a footnote text.

Hope this Helps!

3 0
3 years ago
Read 2 more answers
The slide layout has placeholders for text, charts, and tables. true or false.
Ksju [112]
The answer to this is true
3 0
3 years ago
Read 2 more answers
To create a public key signature, you would use the ______ key.
olya-2409 [2.1K]

Answer:

To create a public key signature, you would use the <u>_private_</u> key.

Explanation:

To create a public key signature, a  private key is essential to enable authorization.

A private key uses one key to make data unreadable by intruders and for the data to be accessed the same key would be needed to do so.

The login details and some important credentials to access user data contains both the user's public key data and private key data. Both private key and public key are two keys that work together to accomplish security goals.

The public key uses different keys to make data readable and unreadable.

The public key is important to verify authorization to access encrypted data by making sure the access authorization came from someone who has the private key. In other words, it's a system put in place to cross-check the holder of the private key by providing the public key of the encrypted data that needed to be accessed. Though, it depends on the key used to encrypt the data as data encrypted with a public key would require a private key for the data to be readable.

4 0
3 years ago
A machine called a centrifuge is used in _____.
Alenkasestr [34]
A machine called a centrifuge is used in many technologies and branches of science, it uses rotary motion to separate material held in suspension from the medium it is suspended in.
7 0
3 years ago
Other questions:
  • When computers connect to one another to share information, but are not dependent on each other to work, they are connected thro
    7·1 answer
  • You are entering command that operates on a file. The path to the file is lengthy and confusing and you are afraid that you will
    12·1 answer
  • _______________creates new markets separate to the mainstream; markets that are unknowable at the time of the technology's conce
    8·1 answer
  • Which of the following resources is an example of a web-based application?
    15·1 answer
  • . In testing, what is the role of an oracle?
    15·1 answer
  • The signature area in a cover letter includes the sender's first and last name, followed by his/her job title (if applicable). *
    13·1 answer
  • The advancement in speed of transportation is attributed to invention of this device
    8·1 answer
  • ABC IF U HAVE A LEGENDARY PET ON ADOPT ME OR ANYTHING COOL!! &lt;3
    5·2 answers
  • Which Tab contains the paragraph attributes?
    5·1 answer
  • What is a cpu in full explanation?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!