1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Korolek [52]
4 years ago
5

Steve is proofreading his memo and he notices that he has typed a phrase twice. Steve should _____.

Computers and Technology
2 answers:
butalik [34]4 years ago
7 0
The answer is B.) <span>highlight the phrase and press Delete</span>
vlabodo [156]4 years ago
5 0

The correct answer is B. Highlight the phrase and press Delete

Explanation:

In writing, proofreading means to read again a text you have written and improved it by identifying mistakes or aspects to improve and revising them. In the case of Steve, he notices he has typed a phrase, this means he needs to delete one of the phrases as otherwise, the text would be redundant. This can be done in programs such as Microsoft Word simply by highlighting or selecting all the words he wants to erase and then pressing the key "Delete" or "Del." that is usually smaller than the "backspace" key and it is useful to delete elements that you have selected. According to this, Steve should "highlight the phrase and press Delete".

You might be interested in
What aviation first is janice brown credited with
Alla [95]

Janice Brown is a former teacher who flew the first long-distance solar-powered flight. She flew a small experimental solar-powered aircraft six miles.

Let me know if you have any questions.

7 0
3 years ago
What type of software repairs or improves a larger application that is already installed on a system?
earnstyle [38]

Answer:

<h2>Mapping</h2>

Explanation:

<h2>Hope it helps you</h2>
7 0
3 years ago
Read 2 more answers
What are some of the challenges that could arise from setting up a file management system on a computer?
emmainna [20.7K]
File management is set of methods for naming, storing and handling files. <span>A few key things that should be taken into consideration are: date, genre, occasion, and subject. After setting up a file management system on a computer the following challenges could arise: </span>standardize file naming, folder structure, metadata use and more. .
5 0
3 years ago
Assume that a file containing a series of integers is named numbers.txt. Write a program that calculates the average of all the
Anna [14]

Answer:

Program in Python:

file = open("numbers.txt", "r")

count = 0

isum = 0

content = file.readlines()

for nums in content:

    num = nums.rstrip('\n').split(" ")

         for i in num:

              isum= isum + int(i)

              count = count + 1

print("Average: "+str(isum/count))

Explanation:

This line opens the file named numbers.txt

file = open("numbers.txt", "r")

This line initializes num to 0

count = 0

This line initializes sum to 0

isum = 0

This line reads the content of the opened file file

content = file.readlines()

This iterates through the content of the file

for nums in content:

This removes trailing new lines and blank spaces from each number

    num = nums.rstrip('\n').split(" ")

This also iterates through the content of the file

         for i in num:

This calculates the sum of the numbers in the file

              isum= isum + int(i)

This counts the numbers in the file

              count = count + 1

This calculates and prints the average of the numbers

print("Average: "+str(isum/count))

8 0
3 years ago
Clicking a _____ name opens a drop-down list of commands and options. Select one: a. menu b. status bar c. ribbon d. toolbar
Rasek [7]

Answer:

menu

Explanation:

https://quizlet.com/231958668/windows-chapter-1-concepts-exam-flash-cards/

6 0
3 years ago
Other questions:
  • An expression that has correctly paired delimiters is called a(n)
    6·1 answer
  • In distributed dos attacks, the attacker sends messages directly to ________. bots the intended victim of the dos attack backdoo
    7·1 answer
  • You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should install a personal _
    10·1 answer
  • "To take advantage of these developments in the digital world, new approaches, concepts,instruments, and methods are needed, whi
    8·1 answer
  • Special effects are added using the _____.
    16·1 answer
  • Why did Simon bring Michael home?​
    9·2 answers
  • Explain in details three security countermeasures you know.​
    10·1 answer
  • Businesses and sometimes individuals use a _____ to assimilate all of their social media content on a specific topic to engage r
    13·1 answer
  • The height of a small rocket y can be calculated as a function of time after blastoff with the following piecewise function: y 5
    10·1 answer
  • Jasmine plays a game on her computer screen. A moving balloon appears on the screen, and she has to pop the balloon by clicking
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!