1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
qaws [65]
3 years ago
13

In the replace dialog box, clicking what button changes highlighted text

Computers and Technology
2 answers:
Nonamiya [84]3 years ago
8 0

In the Replace dialog box, clicking on either “replace” or “replace all” button will change the highlighted text and replace it with the new text you have specified in the “replace with” text field. The highlighted text is a result of finding a specific word and the dialog box gives you the option to replace the found word with a new text. It is more appropriately referred to as the “Find and Replace dialog box.”

Andre45 [30]3 years ago
7 0

ANSWER: Replace Button

EXPLANATION: After opening the replace dialog box and putting the desired values in the boxes, we need to click the 'Replace' button to change the highlighted text. If the word which needs to be changed appear multiple times in the document, then clicking on 'Replace All' is advised as it would change all the old words with the new ones.

You might be interested in
Write a function in MATLAB that takes as an input a matrix of coefficients for a system of linear equations (A), the solution ve
Illusion [34]
Answer is A all the way to the right
7 0
4 years ago
What is occurring when an attacker manipulates commonplace actions that are routinely performed in a business?
serg [7]

Answer:

Vulnerable business processes, also called business process compromise (BPC), occurs when an attacker manipulates commonplace actions that are routinely performed.

4 0
3 years ago
Team A found 342 errors during the software engineering process prior to release. Team B found 184 errors. What additional measu
igomit [66]

Answer:

see explaination

Explanation:

The "size" or "functionality" of the project would need to be determined. Errors/FP would provide a normalized measure.

A metric such as DRE would provide an indication of the efficiency of SQA within both teams' software process.

3 0
4 years ago
A user informs you that he or she never deletes any files he or she creates. How might this affect the operating system? It will
Juliette [100K]

Answer:

Depending on the amount of files there are, the operating system will run slower because these files take up space on the hard drive, slowing it down.

Explanation:

6 0
3 years ago
A Web site that allows users to enter text, such as a comment or a name, and then stores it and later display it to other users,
balandron [24]

Answer:

Option(c) is the correct answer.

Explanation:

Cross-site scripting is the type of security breach that are usually found in the  software applications.The main objective of cross site scripting it is used by the hackers to exploit the data security.

  • The cross site scripting is the collection of web pages  that enables people to insert the text like comment,  name stores it afterwards it save the data and then  it appears to the other users.
  • Others options are incorrect because they are not related to given scenario.
5 0
3 years ago
Read 2 more answers
Other questions:
  • A Color class has a method getColorName that returns a string corresponding to the common name for the color, e.g., yellow, blue
    11·1 answer
  • Which actions help to protect a computer and keep it running properly? Check all that apply.
    10·1 answer
  • Python provides a special version of a decision structure known as the ________ statement, which makes the logic of the nested d
    13·1 answer
  • When mapping a drive, you can type in the path to the shared folder on the host computer. what is the syntax for the path?
    7·1 answer
  • Which type of choir often sings AND dances while they perform?
    9·1 answer
  • Write a function template that accepts an argument and returns its absolute value. The absolute value of a number is its value w
    11·1 answer
  • Write a C function named apply_all that expects two arrays of integers and their sizes and dynamically allocates a new array of
    7·1 answer
  • Write Epic username plz
    6·1 answer
  • Why is it important to continiously conduct penetration testing for a strong security system?.
    15·1 answer
  • What is the total number of time zones that can be configured to show by default in a calendar in Outlook 2016?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!