1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiks02 [169]
4 years ago
15

Jack is writing a paragraph for a school assignment. He proofreads his paper and notices that he used the word, "then" many time

s. To find a new word, Jack should use the _____.
Thesaurus
Spell check
Help feature
Grammar check
Computers and Technology
2 answers:
lianna [129]4 years ago
6 0

He would use a Thesaurus for the reason that it has synonyms for then, because if you have one word in the same paper many many times it will just seem like your blabbering and the Thesaurus makes you feel smart, as well as look smart.


Hope this helps


<em><u>Marcy~</u></em>


Lynna [10]4 years ago
5 0

He should use a Thesaurus.

You might be interested in
. A wireless ……..is a device used to resolvewireless network connectivity problems.
Setler [38]

Answer:LAN adapter

Explanation:

LAN adapter is use to connect a computer to the network in an local area network. The connection is possible via a modem or a router which helps to reduce the wireless connectivity problem.

4 0
3 years ago
You are asked to assume the role of an employee of the DigiFirm Investigation Company. As part of its community outreach effort,
kirill [66]

Answer:

1.  To trace an email we need to examine the header part of the email. By examine the header of an email we could extract the sender, subject and other important credentials related to that email.  

2. The command to trace the email id is “whois” command.

 First open the email client and find the IP address of the received email that need to be traced.  The command “whois” IP address gives the registration information of that IP address.

 3.  Reverse address/email search is the procedure used by the experts to find the origin or the ownership of the email.  Rather than tools websites are more use full in the reverse address search.

http://reverse.addresssearch.com, www.iplocation.net, etc. are good to find the ownership of an email.

4. We need to set up mail server to send, receive and to explore various activities associated with an email.  The other related purpose servers like SMTP server, HTTP server , etc are also required to assist large organizations.  The mail server can be a stand-alone computer or a collection of computer and servers.

 5.  The executable files should be examined thoroughly in the server, it can be dangerous malwares.  The examination is mainly done by scanning for malicious words and sender address.  Since many mail providers does not allow executable files to send, so the attackers are using other files also as a carrier of the malwares, so now every emails should be subject to deep examination using some malware scanner.  

6.   By the time of examination the some of the legitimate mails may also come under the suspect list so further check is needed there.  At the same time the attacks can be from legitimate sources also this could be go un-noticed; this should be also a challenge to face in the stage of e-mail examination.

8 0
3 years ago
What does the % math operation do?
Nataliya [291]

Answer:

The percentage sign %, called modulo (or the remainder operator) is a operator which will find the remainder of two numbers x and y.

Explanation:

3 0
3 years ago
How many Packs of cigarettes in one carton? 6, 8, 10, 12 ?
Gnesinka [82]
There are 8packs of 25, or 10 packs of 20 depending on the brand.... both adding up to 200 cigarettes total.

6 0
3 years ago
TLE 10 - ICT
Kipish [7]

Answer:

Information And Communication Technology

5 0
3 years ago
Other questions:
  • What are the example of dedicated computers?
    5·1 answer
  • What percentage of the global population of about seven billion people used the Internet in 2012?
    5·2 answers
  • Declare a char array named line suitable for storing C-strings as large as 50 characters, and write a statement that reads in th
    13·1 answer
  • Nonverbal communication relies on _________________. a. multiple channels b. continuous feedback c. ambiguous interpretation d.
    9·1 answer
  • Excel recognizes an entry as a value if it is a number or it begins with ____
    8·1 answer
  • Are you concerned that strangers may have access to the personal information you share on social media platforms? Why or why not
    10·1 answer
  • What X coordinate does the center of a game begin at?
    9·1 answer
  • You are creating a budget for your new business. What should you include?
    7·1 answer
  • Plagiarism is when you try to pass of someone else's words as your own. What else does it include? Select all that apply. Please
    5·1 answer
  • David is taking a test. To answer a question, he first covers up the answer choices. Next, he tries to answer the question. Then
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!