1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
LiRa [457]
3 years ago
13

What command should you select to track changes in a document

Computers and Technology
1 answer:
Keith_Richards [23]3 years ago
8 0
How do I track changes in a Word document?<span>Open your Microsoft Word document, and locate the tab labeled Review.Locate the Track Changes icon in the Tracking panel; be sure that it is not illuminated.To accept the proposed change, click on the Accept button.</span>
You might be interested in
As the network administrator for a growing company, you’re asked to solve a remote access dilemma. The 12 employees who work fro
Strike441 [17]

Answer:

To provide remote network access to the users to work, the network administrator can use virtual private network (VPN) along with some firewall to protect the system from hackers and other security threats.

Explanation:

Virtual Private Network (VPN) can be used to provide remote access to the users who are currently working from some remote areas. Many companies who have their branches or franchises in different parts of the city uses VPN to connect then all with the company server.

In this way, a firewall has been needed that protect the systems of users as well as company to protect from different security hazards such as hackers, authorization of the users and other security threats.

in this case, 12 em[employees who need remote access to the network can be connected through VPN along with the installation of some suitable firewall.

8 0
4 years ago
A student dissolves some solid sodium hydroxide in a beaker of water.
STALIN [3.7K]
C water is the soulute
7 0
3 years ago
Read 2 more answers
In order to communicate between devices inside a computer?
labwork [276]
Seems to be a CPU, central processing unit

Handles transactions between on-board memory, as well as I/O (input/output) devices.
4 0
3 years ago
What precautions should be taken to make a computer more secure ​
Sergeeva-Olga [200]

Answer:

To make a computer more secure

Explanation:

we have following ways :

1)we should have anti virus to protect our computer.

2)we should not play or look computer for a long time because it destroy our files

4 0
3 years ago
"which programming language is used within html documents to trigger interactive features?"
Rasek [7]
JavaScript can be used to create interactive web pages.
5 0
3 years ago
Other questions:
  • If a 120 V appliance requires 15 A to operate, what is the resistance of the appliance?
    10·1 answer
  • HELPPPP!!
    8·2 answers
  • Whoever answers int the next 15 minutes will get brainliest. To get brainliest, it also has to be the correct answer. 8 points r
    11·2 answers
  • Review the HTML tags that we have gone over in this lesson. Research HTML tags on the web and identify two new tags. Use these t
    9·1 answer
  • 3. Compilers and Assemblers translate each source file individually to generate object code files. Hence the object files need t
    13·1 answer
  • 31. Explain what the program does. Write out the output 20 PRINT "Hellooo00000000000, world!" 30 PRINT "I'm learning about comma
    7·1 answer
  • A two-dimensional array has been defined to hold the quantity of each of 5 different healthy snack products sold in a tuckshop d
    10·1 answer
  • Who do we need more in the world? Computer technicians, or electric technicians and why.
    9·1 answer
  • The border to the right of a column is called the ____.
    12·1 answer
  • unlike the barcode-based tracking system, a radio frequency identification system offers a .
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!