1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vitek1552 [10]
3 years ago
6

What are some options available in the Spelling and Grammar Checker in word?

Computers and Technology
1 answer:
denpristay [2]3 years ago
6 0
Some options are add to dictionary, ignore once, ignore all, autocorrect, change, and change all.
You might be interested in
quizlet ann is a security professional for a midsize business and typically handles log analysis and security monitoring tasks f
Sergio039 [100]

At this point in the incident response process, the term that best describes what has occurred in Ann's organization is known to be C. Security event.

What is the security event?

A security event is known to be an alteration  in the day to day running of the operations of a network or an information technology service and it is one that tends to show the point that a security policy need to have been violated or a security safeguard could have failed.

Note that in the above point in the process, Ann is a person who see no reason to believe that any real security compromise or policy violation has occurred as this kind of situation does not meet the stage of been called a security incident or intrusion.

Therefore, based on the above, At this point in the incident response process, the term that best describes what has occurred in Ann's organization is known to be C. Security event.

Learn more about Security event from

brainly.com/question/27225071
#SPJ1

Ann is a security professional for a mid-sized business and typically handles log analysis and security monitoring tasks for her organization. One of her roles is to monitor alerts originating from the organization's intrusion detection system. The system typically generates several dozen alerts each day, any many of those alerts turn out to be false alarms after her investigation.

This morning, the intrusion detection system alerted because that network began to recieve an unusually high volume of inbound traffic. Ann recieved this alert and began looking into the orgin of the traffic.

65. At this point in the incident response process, what term best describes what has occurred in Ann's organization?

A. Security occurrence

B. Security incident

C. Security event

D. Security intrusion

8 0
1 year ago
A new product was introduced in 2003, which functions as both an identification device and a medium of communication. It uses in
Svetllana [295]

Answer:

nTag

Explanation:

nTag describe -Providing information on freight limitations-Preparing documentation-Packing exhibit materials-Helping to ensure that shipments arrive on time.

5 0
3 years ago
Consider the recursive method myprint in this code snippet: public void myprint(int n) { if (n < 10) { system.out.print(n); }
valkas [14]
What the method does, is it takes the rightmost decade and prints it, then divides by 10 and repeats. Effectively this means the number is printed backwards, so the output is 128.
7 0
3 years ago
Help pls<br> cmu cs 0<br> 4.1.2.1 Creating Groups checkpoint 1
Sindrei [870]

Answer:

Explanation:

Circle(centerX, centerY, radius, fill='black', border=None,

borderWidth=2, opacity=100, rotateAngle=0, dashes=False,

align='center', visible=True)

8 0
2 years ago
Read 2 more answers
Robert is leading a project online that includes students from different cultures. Two of the students spend most of the time li
enyata [817]

Answer:

A & C

Explanation:

8 0
3 years ago
Other questions:
  • Into which of these files would you paste copied information to create an integrated document?
    13·2 answers
  • Derek found that the CPU was running several processes. While Derek was looking at Task Manager, the computer crashed. Derek res
    15·2 answers
  • Which aperture setting will give the shallowest depth of field?
    10·2 answers
  • PLEASE HURRY
    6·1 answer
  • What does this say:<br> √ans
    6·2 answers
  • PLEASE HELP POWER POINT:
    8·2 answers
  • Binary Numbers and Conversion 1. Complete the following decimal-to-binary number conversions. a) 17 (10) b) 34 (10) c) 58 (10) d
    9·1 answer
  • Write a java code to print Multiplication Table Till 20
    14·2 answers
  • Can able to Computer decide its input by itself? How ?​
    15·1 answer
  • What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!