1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Advocard [28]
3 years ago
7

7. When using find command in word we can search?

Computers and Technology
1 answer:
lesya [120]3 years ago
6 0

Answer:

When using find command in word we can search all of the above

You might be interested in
Which of the following is a form of security protection that protects individual files by scrambling the contents in such a way
Alla [95]

Answer: C. File encryption

Explanation: To ensure security and privacy of files and its content, encrypting the file may be an option. File encryption refers to a process of ensuring the security and privacy of individual files so as to prevent unauthorized access to the content. File encryption works by setting up a security key which will be requested or needed when the file is being clicked such that only users or individuals with the authorized pass code or password can open and read its content or modify the file, this is called file decryption.

8 0
3 years ago
You want some points? whoever answers first gets 48 points. no cap. better be quick.
LekaFEV [45]

Answer:

4

Explanation:

5 0
2 years ago
Read 2 more answers
Levi's an experienced marketing strategist for a software company that sells a learning platform to public schools. He developed
koban [17]

Answer:

B. He segments data using his company’s CRM dashboards, giving his organization access to data that powers their decision-making.

E. He encourages learning from failure, which is necessary for testing the possibilities and for learning what does not work.

Explanation:

He seems to have realized that learning from mistake is important, and that can be done through the research of the company's past. Also, he has also learnt to analyze the data as well, as he is able to constantly evolve company.s marketing strategies to fit to school's training needs. And this is impossible without analysis and research. It also looks like that he is a good learner, and loves exploring new things. And he must be using analytic software like Tableau OR Power BI, and he might be using Machine learning as well, and definitely the latest. And he is definitely a good manager.

And since its management level, B is definitely correct as it is reliable, and other options are not reliable.

6 0
3 years ago
During spring in Colorado, ice on the mountain tops melts into water. Some of this water gets trapped in cracks in the mountain
zlopas [31]
Physical weather. It isn't changing the the chemical or biological make up.
3 0
3 years ago
Read 3 more answers
When the _____ logical operator is used to combine keywords, a search engine will retrieve all results containing either keyword
DanielleElmas [232]
OR! Because one OR the other (or both, as this is not an exclusive or) needs to be present in the search result.
8 0
3 years ago
Read 2 more answers
Other questions:
  • One of the attributes in a table in your database depends on another attribute for its meaning. What type of dependency has been
    14·1 answer
  • If a speed mismatch was configured between two Cisco routers' Ethernet interfaces, what would the status of this interface be?
    12·1 answer
  • As Juan sat in his biology lab, his instructor was droning on about the techniques of vivisection. Juan kept thinking about the
    5·1 answer
  • 1. What are copyright laws? (6 points)
    15·1 answer
  • A(n ____ is information that a web server stores on a client computer, such as the client’s preferences when accessing a particu
    15·1 answer
  • 4. What is an example of a Trans receiver? *<br> A. Pager<br> B. Wi-Fi<br> C. Telephone
    14·1 answer
  • Dr. Kim divides a programming class into groups. Each group will create a large program as their
    15·2 answers
  • Initialized the variable with the value 0
    11·2 answers
  • is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r
    6·1 answer
  • Who Has any idea How to code?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!