Answer:
Replace text as you type.
Explanation:
Replace text as you type is the Autocorrect option that enables you to add and delete words that do not follow abbreviation rules. This tool is available under the PROOFING tab. For example, if you use a long phrase frequently, simply add it to the replace text as you type. For instance, if you type your address frequently, add 34 Willoughby Street, London, and abbreviate it to 34WS and it was replace it to the long phrase as you type 34WS.
Answer:
To protect the computer network of a large organization, network engineers monitor network traffic. Malware detection method of data mining best being used to protect the network.
Explanation:
Data mining has excellent potential as a malware detection tool. It allows us to analyze vast sets of information and gives an opportunity to extract new data from it. It also provides the ability to identify both known and zero-day attacks.
Answer:
An LS button
Explanation:
It appears on the (structure line 3)on the structure line, place your cursor in the <u>whi</u><u>te</u> field to the right of the E button (Recall that the E button represent the entry test).
Inside the case are the components that make up the computer itself, such as the RAM memories, the processor and the hard disk, all of which are directly or indirectly connected to the motherboard. In addition, the case allocates the power suplly, which is responsible for supplying power to the computer.
<h3>What is a computer case?</h3>
The case is the hardware component used to house most parts of a computer. It is inside it that components such as CPU, motherboard, SSD, video card and power supply are placed.
In addition, it is where the outputs for connections to other equipment are found, such as USB and HDMI outputs, plug for sound box and microphone and input for memory card.
The case has the important function of protecting the internal components of a computer from knocks, heat, light, moisture and dust. That's because most of the electronic components inside a computer are very sensitive and need this protection.
It is also used to connect to other hardware components, such as a monitor, keyboard, mouse and headset, through the various outputs provided on its exterior.
See more about computing at: brainly.com/question/15707178
#SPJ1