1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nikklg [1K]
3 years ago
8

Nadia would like to find text in her current document that differentiates CompanyABC from companyabc. Which option should she us

e?
Find whole words only
Match Case
Wildcards
Match Prefix
Computers and Technology
2 answers:
s344n2d4d5 [400]3 years ago
5 0

Answer:

Option B

Match case is the correct option

Explanation:

as we can see in the text CompanyABC  "C" for company is written in large case similarly ABC is also in large case

while :companyabc" is written in small case hence there is a difference in cases of both words

that's why Nadia would choose Match case option to find text in her current document that differentiates CompanyABC from companyabc

kipiarov [429]3 years ago
3 0

The option that Nadia should use is Match Case. This is because it will match your case.

You might be interested in
How can templates be made available to other users?
Daniel [21]

Answer:

b

Explanation:

4 0
3 years ago
Algorithm and flowchart:- find the product of two number (a and b)​
Korvikt [17]

Answer:

i have no idea a i guess

Explanation:

5 0
3 years ago
To figure out how to use her MacBook Pro graphics software to update designs originally created on a DEC10, Marianne needs to us
mina [271]

Answer:

Glue Language

Explanation:

I'm not 100% sure, but here is the definition.

Glue language- A programming language that can be used to provide interoperability between systems not originally intended to work together

6 0
3 years ago
A stealth network attack in which an unauthorized person gains access to a network and remains undetected for a long time is ref
polet [3.4K]

Answer:

"Advanced persistent threat " is the right one.

Explanation:

  • APT seems to be a clandestine cyber assault on something like a network connection where another assailant achieves and retains unauthorized knowledge to the communication network, however impossible to conceive for a considerable period.
  • They represent compound channel assaults that use different components including various approaches of attack.
6 0
3 years ago
Hope wants to add a third use at the end of her
Arisa [49]

Answer: Put her insertion point at the end of the item 2b.

Press the enter key.

Explanation:

6 0
2 years ago
Other questions:
  • During slideshow mode hitting the b key will do which of these
    5·1 answer
  • You want to implement a mechanism that automates ip configuration, including ip address, subnet mask, default gateway, and dns i
    14·1 answer
  • The syntax used for referencing cells with their worksheet names is the sheet name, followed by ____, then the usual column lett
    8·1 answer
  • What is the command to create a compressed archive(archive1.tar.gz) of files test1 test2and test3.
    5·1 answer
  • Suppose you are given a data set consisting of nominal attributes, such as color, which takes values such as red, blue, green et
    9·1 answer
  • What are some benefits of 3-D printing?
    9·1 answer
  • How was the addition of an improvement over early web design?
    11·1 answer
  • What is the best stratiget to avoid paying intrest in your credit cared
    13·1 answer
  • 2 examples of miniature storage media ?
    8·2 answers
  • A network administrator wants to authenticate server machines using Transport Layer Security (TLS). What can the administrator i
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!