1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara31 [8.8K]
3 years ago
15

Which option marks all modification made within a document? Review Comment Track Changes Balloons

Computers and Technology
2 answers:
Andreas93 [3]3 years ago
8 0

The answer is: Track Changes

The track changes option in word is made in order to specify the time of the change, and the user who did the modification to the document.

This feature is very useful in shared file. Usually used by team leaders to identify which users are responsible in case a mistake was made during the process of working on the document.

bekas [8.4K]3 years ago
7 0

Answer:

Track changes

Explanation:

-Review is a tab that has commands that can be used to modify the documents, for example, add comments and protect a document.

-Comment is a tool that allows you to add a box in the right side of the document to write thoughts or opinions.

-Track Changes is a tool that helps you to see all the changes that have been made to the document.

-Balloons is an option that allows you to pick how you want to see the revisions: by using balloons on the side or by showing them in the document.

According to this, the option that marks all modification made within a document is track changes.

You might be interested in
What is displayed in the alert dialog box after the following code is executed? var items = 3; for (var i = 1; i <= items; i+
LenKa [72]

Answer:

The factorial of 3=6

Explanation:

Following are the description of the given question

  • This is JavaScript code .Here items are the variable that are holding the integer value "3".
  • After that there is 2 loop are iterating one is outer and one inner loop.
  • When i=1 1<=3 the condition of outer loop is true  the control moves the inner loop .
  • In the inner loop there is variable result that is initialized by 1 Now checking the condition of inner loop j=i i.e j=1 1>=1 condition of inner loop is true it executed the statement inside the inner loop  so result =1 .Now we increment the value of i of the outer loop.
  • i=2 2<=3 the condition of outer loop is true  the control moves the inner loop .
  • In the inner loop there is variable result that is initialized by 1 Now checking the condition of inner loop j=i i.e j=2 2>=1 condition of inner loop is true it executed the statement inside the inner loop  so result =2 .Now we increment the value of i of the outer loop.
  • Now i=3 3<=3 the condition of outer loop is true  the control moves the inner loop .
  • In the inner loop there is variable result that is initialized by 1 Now checking the condition of inner loop j=i i.e j=3 3>=1 condition of inner loop is true it executed the statement inside the inner loop  so result =6 .Now we increment the value of i of the outer loop.
  • i=4 4<=3 the condition of outer loop is false  the control moves from  the outer loop.
  • It print The factorial of 3=6

4 0
3 years ago
what is the greatest number of bits you could borrow from the host portion of a class b subnet mask and still have at least 130
Lina20 [59]

The greatest number of bits you could borrow from the host portion of a class b subnet mask and still have at least 130 host per subnet is 24.

<h3>What is a host bit?</h3>

Host bits are known to be the parts of an IP address that can state out a particular host in any subnet.

Note that whenever we take or borrow an host-bit, we can also double the number of subnets that we are said to create and as such, when we borrowing 2 host bits we can have 4 subnets.

Learn more about Bits from

brainly.com/question/19667078

6 0
2 years ago
It's best to use assertive speech when you<br> I want to show respect. *<br> True<br> False
mestny [16]

Answer:

True

Explanation:

Hope this helps :)

6 0
3 years ago
Read 2 more answers
Write a C program to implement a command called ​displaycontent ​that takes a (text) file name as argument and display its conte
Zanzabum

Answer:

/*

Student: Hugo Meza

Date: February 15, 2019

Description: This program mimic the cat command from Linux. Checks whether the source file

has the right permissions, and then writes in the console its content.

*/

#include <stdio.h>

#include <fcntl.h>

#include <unistd.h>

#include <errno.h>

int hasPermission(char *filepath){

int returnval;

// Check file existence

returnval = access (filepath, F_OK);

if(errno == ENOENT){

printf ("%s does not exist\n", filepath);

return 0;

}

else if (errno == EACCES){

printf ("%s is not accessible\n", filepath);

return 0;

}

// Check read access

returnval = access (filepath, R_OK);

if(errno == ENOENT){

printf ("%s does not have read access\n", filepath);

return 0;

}

else if (errno == EACCES){

printf ("%s is not accessible\n",filepath);

return 0;

}

// Check write access

returnval = access (filepath, W_OK);

if(errno == ENOENT){

printf ("%s does not have read access\n", filepath);

return 0;

}

else if (errno == EACCES){

printf ("%s is not accessible\n",filepath);

return 0;

}

return 1;

}

int main(int argc, char* argv[]){

if(!argv[1]){

printf("Error. Specify file to open\n");

return 0;

}

int fd;

char *fp = argv[1], content[fd];

if(hasPermission(fp) == 0)

return 1;

fd = open(fp, O_RDONLY);

int bytes = read(fd,content,sizeof(content)-1);

write(1, content, bytes);

close(fd);

return 0;

}

Explanation:

7 0
3 years ago
What are good spending habits?
Elena-2011 [213]
Buying something you need not want is a good spending habbit :)
8 0
3 years ago
Read 2 more answers
Other questions:
  • What is the Web of Trust?
    12·1 answer
  • Print a countdown from n to 1 The function below takes one parameter: an integer (begin). Complete the function so that it print
    8·1 answer
  • Given the following sequence of integers: 12, 19, 10, 4, 23, 7, 45, 8, 15 Build a heap by inserting the above set, one integer a
    8·1 answer
  • 1. What does MS-DOS use for input?
    5·1 answer
  • Which scenario could be represented by the given graph?
    14·1 answer
  • describe at least five ways in which information technology can help studying subjects other than computing​
    6·1 answer
  • What is the deffirentiates in organs from tissues
    11·1 answer
  • How does the variable scope influence the structure of an algorithm
    7·1 answer
  • Decimal numbers is equivalent to binary 110
    5·1 answer
  • *the sticker, available in the middle section of the prescription label, will indicate if the customer requested non-safety caps
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!