1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shkiper50 [21]
4 years ago
13

1

Computers and Technology
1 answer:
Sergio [31]4 years ago
3 0

Answer:

The answer to this question is given below in the explanation section

Explanation:

The ctrl+shift+e command is used to select track changes in a document.

Track Changes is a feature that is used in MS word or in wordprocessing application to track the changes inserted or modified by different users in a document. This helps the user to know where new text inserted or modified. Track changes help users to know new updates being inserted by other users in the document.

Furthermore, you can access the track changes features in the word file under the review tab. where you can find other related settings and features related to the track changes.

You might be interested in
Digital _________ Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditio
disa [49]

Answer:

D. Subscriber

Explanation:

Digital Subscriber Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines.

The high speed data transmission property helps to transmit data in a fast and timely manner between two or more points or people during calls, texts and other activities.

6 0
3 years ago
Write a C++ program to grade the answers to a true-false quiz given to students in a course. The quiz consists of 5 true-false q
Eddi Din [679]

The quiz program is an illustration of loops and conditional statements

  • Loops are used to perform repetition
  • Conditional statements are used to make decisions

<h3>The quiz program</h3>

The quiz program written in C++, where comments are used to explain each action is as follows:

#include <iostream>

using namespace std;

int main(){

   //This prints the instruction

   cout<<"Enter T/t for True; F/f for False\n";

   //This initializes the question

   string questions[5] = { "Q1", "Q2", "Q3", "Q4", "Q5"};

   //This initializes the correct options

   char options[5] = { 'T','T','F','F','T'};

   //This declares the user response

   char opt;

   //This initializes the score to 0

   int score = 0;

   //This loop is repeated 5 times

   for (int i = 0; i < 5; i++){

       //This prints the current question

       cout << i + 1 <<". "<<questions[i]<<"\nAnswer: ";

       //This gets the user response

       cin>>opt;

       //If the user response is correct

       if(toupper(opt) == options[i]){

           //The score is incremented by 2

           score+=2;

       }

   }

   //This prints the total score

   cout<<"Score: "<<score;

   return 0;

}

Read more about loops at:

brainly.com/question/19347842

7 0
2 years ago
List 5 ways that computers could be used in a school or university
larisa [96]

Answer:

Explanation:

✓ computer can be used Interactive Learning apps, whereby students can share knowledge

✓Access to Information on the go: computer can be searched when educational information is needed

✓Virtual Classrooms : Incase of online classroom computer can be of help where both teacher student can meet online

✓Data processing and presentation ; computer can be used by both teacher and student in processing of data's.

✓Computer Literacy Education : for Literacy Education, computer can be used in training students to become computer literate.

4 0
3 years ago
Barry discovers that an attacker is running an access point in a building adjacent to his company. The access point is broadcast
Kamila [148]

Answer:A) Evil twin

Explanation: Evil twin is a type of attack that happens in the network. This behaves as the alias wireless access point(WAP) which appeals toward users to get connected with false hotspot to steal their personal information.This attack is based on the rogue hotspot .Barry has also faced a evil twin attack while passing by a building and getting his device connected with fake hotspot.

Other options are incorrect because war driving is searching for the internet connectivity while driving,blue snarfing is done with Bluetooth to steal personal data and replay attack in which the transmitted data is repeated in malicious way.Thus, the correct option is option(A).

8 0
3 years ago
Which key or keys do you press to indent a first-level item in a list so it becomes a second-level item
frozen [14]

This would be the Tab key

6 0
3 years ago
Other questions:
  • Ray has to type an invoice using the QWERTY keyboard. Along with letters and numbers, he also has to insert the dollar sign. Whi
    13·1 answer
  • Q10: Putting it all together (0.75 points) Here, we'll update the values in dictionary, storing the output in a dictionary calle
    5·1 answer
  • Working at a ski resort in the mountains has its own unique security issues. Kenny is the chief information officer for Sundance
    10·1 answer
  • Which of the following commands should you use to determine whether there are any shared resources on a Windows computer with th
    15·2 answers
  • Assume that the classes listed in the Java Quick Reference have been imported where appropriate.
    8·2 answers
  • Pick the simplest line of code to test if the word "BASIC" is stored in the variable text1.
    12·1 answer
  • . Select the advantages of RAID-5 relative to other RAID schemes. (MAY SELECT MULTIPLE)
    7·1 answer
  • Tyra used the software development life cycle to create a new game. After debugging and documenting code, she released it to her
    10·1 answer
  • What is the function of ctrl+Q​
    14·1 answer
  • Define online pollution
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!