1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
navik [9.2K]
3 years ago
12

Monica made a mistake. She can select the undo command or use the shortcut to quickly correct her mistake. True False

Computers and Technology
1 answer:
kenny6666 [7]3 years ago
3 0
The answer is true .
You might be interested in
What is network management?
melamori03 [73]
Network management is  a broad range of  functions including activities, methods, procedures and the  use of  tools to administrate,operate,and  reliably maintain computer network system.  <span />
3 0
4 years ago
A user is troubleshooting a mobile device app that is displaying errors and has contacted the app manufacturer’s technical suppo
dlinn [17]

Answer:

The answer is "The user uses the method for retrieval, which is dependent on the specific app or devices on the operating system".

Explanation:

For retrieving the requested information of the form, with the user device, he uses the retrieval method, which is based upon the specific application or system operating system.

  • In this, the user can resolve the mobile phone application but also show the errors which have been committed to the assistance team of the application manufacturer.
  • Its repair technician requires detailed system data on the way the software responds and also what triggers the mistakes.
4 0
4 years ago
Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not
Nataly_w [17]

Answer:

This question was initially incomplete. Here is the full question:

Many Web browsers allow users to open anonymous windows. During a browsing session in an anonymous window, the browser does not record a browsing history or a list of downloaded files. When the anonymous window is exited, cookies created during the session are deleted. Which of the following statements about browsing sessions in an anonymous window is true?

a) The activities of a user browsing in an anonymous window will not be visible to people who monitor the user's network, such as the system administrator.

b) Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer.

c) A user will not be able to log in to e-mail or social media accounts during the anonymous browsing session.

d) A user browsing in an anonymous window will be protected from viruses launched from any Web sites visited or files downloaded.

The correct answer is b) Items placed in a Web store's shopping cart for future purchase during the anonymous browsing session will not be saved on the user's computer.

Explanation:

For e-commerce sites, shopping cart information are stored as cookies on the visitor's computer such that when the website visitor leaves the website and comes back a few days later, their shopping preferences are remembered.

If the website visitor uses an anonymous window, the cookies created during the browsing session will be deleted when the anonymous website is exited and so, items placed in the shopping cart for future purchase will not be saved.

3 0
3 years ago
I need help, thank you
BabaBlast [244]

Answer:

umm I think it's C it's between that one and d so the 1st and 4th but leaning more towards C

6 0
3 years ago
Please state 5 lasting effects about Artificial Intellegence
agasfer [191]

Oxytocin’s

Civic

Icijcuuc

Ificiucuc

Ificifuudu

6 0
3 years ago
Read 2 more answers
Other questions:
  • Building relationships during your career exploration is called
    9·2 answers
  • The fast food restaurant Chipotle pulled its app from Apple's app store when customer demand caused the firm's servers to crash.
    14·1 answer
  • What are the 6 external parts of a computer system
    8·1 answer
  • Most of the pollution in the ocean comes from:
    11·1 answer
  • The _____ search algorithm searches a list for a given item, starting with the first element and continues to compare the item w
    12·1 answer
  • Suppose there are two links between a source and a destination. The first link has transmission rate 100 Mbps and the second lin
    12·1 answer
  • Marissa, a 21-year-old young woman, is working as an intern at a software company. She has recently graduated from college. She
    6·1 answer
  • What is the definition of Overflow Error?
    5·1 answer
  • Cual
    5·1 answer
  • Tips for staying safe using social media. Using in your own words.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!