1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Deffense [45]
3 years ago
10

Microsoft word's spell checker?

Computers and Technology
1 answer:
vekshin13 years ago
8 0
The answer to the given picture is - Microsoft word's spell checker only recognizes very common words. Microsoft word has it's own dictionary which will be compared to the texts on your document. If they see an unfamiliar word they will underline it with red. Anyways you can add your own words and names to the custom dictionary.
You might be interested in
Once jaden has decided upon the telecommunications technology his team will use, he will have completed the last step of the dec
mrs_skeptik [129]
<span>Once Jaden has decided upon the telecommunications technology his team will use, he will have completed the last step of the decision-making process. TRUE.</span>
6 0
4 years ago
At which layer of the osi model is the entire message referred to as the payload
erik [133]

I guess the correct answer is application

An applicatiοn layеr is an abstractiοn layеr that spеcifiеs thе sharеd cοmmunicatiοns prοtοcοls and intеrfacе mеthοds usеd by hοsts in a cοmmunicatiοns nеtwοrk. Thе applicatiοn layеr abstractiοn is usеd in bοth οf thе standard mοdеls οf cοmputеr nеtwοrking: thе Intеrnеt Prοtοcοl Suitе (TCP/IP) and thе ΟSI mοdеl. Althοugh bοth mοdеls usе thе samе tеrm fοr thеir rеspеctivе highеst lеvеl layеr, thе dеtailеd dеfinitiοns and purpοsеs arе diffеrеnt.

6 0
3 years ago
Asymmetric key encryption combined with the information provided by a. certificate authority allows unique identification of the
Nesterboy [21]

Answer:

c. both the user and the provider of encrypted data.

Explanation:

In assymetric key encryption, you will need the public key of the sender to decode the information along with your private key to decode the encrypted information. if you don't have any of the keys, you won't be able to read the information. You must have both in order to read the information sent.

5 0
3 years ago
What do the last two steps in the cyclical design process most likely involve
zlopas [31]

Answer:

Well you would want to test the design, so it would be "c" then "d"

Explanation:

I hope this helps.

8 0
2 years ago
What is the output of the following code? (Please indent thestatement correctly first.)
goldenfox [79]

Answer:

no output, it does not print any thing

Explanation:

if-else statement is used to execute the statement after checking the condition if the condition is true, it allows the program to execute the statement otherwise not.

in the code, define the variable with values x = 9, y = 8 and z = 7.

Then, if the statement checks the condition 9 > 9, the condition is false.

So, the program terminates the if statement and executes the next statement but there is no next statement.

the other if-else statement is within the if condition which already terminates.

Therefore, there is no output.

7 0
3 years ago
Other questions:
  • 1. Why is it important to compare features of a computer before making a purchase?
    13·2 answers
  • Effective feedback should focus on the behavior, not the person.<br><br> True<br> False
    9·2 answers
  • What question should you ask yourself to determine if a story is newsworthy
    11·2 answers
  • 3. What are the first steps that you should take if you are unable to get onto the Internet? (1 point)
    15·1 answer
  • Yahoo and Google are examples of __________ used to perform Internet research.
    14·2 answers
  • What are some hazards of being an astronomer??
    6·1 answer
  • If I was to sort the months of the year in ASCENDING order alphabetically, which
    11·1 answer
  • These days, a digital signature is just as legitimate and trusted as an old-fashioned John Hancock on paper.
    9·1 answer
  • What do you think entertainment or gaming platforms will look like in the future?
    9·1 answer
  • Which of the following BEST describes a permissive software license?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!