1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SashulF [63]
3 years ago
6

In Word, a red wavy underline indicates a/an

Computers and Technology
1 answer:
insens350 [35]3 years ago
6 0
It's B. grammar errors are blue and autocorrect suggestions produce a small dialog box. I'm unsure what D is, but it's not an underline.
You might be interested in
It is a SQL keyword that creates an autoincrementing field.
Serjik [45]

Answer:

c. AUTO_INCREMENT

Explanation:

this should help

6 0
3 years ago
Andrea needs to format the legend on her chart. She clicks on the chart to select it. Which of the
Sever21 [200]
For Andrea to format the legend on her chart, she needs to click on the chart to select it. The Chart Tools option appears when a chart is selected. Andrea can build charts easily and successfully using the Chart Tool in Microsoft Excel or any other Spreadsheet programme. Let us assume that Andrea is using Microsoft Excel to create her chart. When she opens Excel and looks at the ribbon band on top of the new spreadsheet, there is an option to create charts. Using this option, she can create as many charts as she needs to 
7 0
3 years ago
A support technician uses the ping utility on a system that is online, yet no response is received. What should be allowed throu
alexgriva [62]

Answer:

Internet Control Message Protocol (ICMP) Echo Requests

Explanation:

A system that has Windows Firewall or antivirus or other third party antivirus enabled with their configuration setting set to default, ping command from another device will not be able to see if the device with an enabled firewall is alive.

The ping command sends Internet Control Message Protocol (ICMP) Echo Request to a destination device after the destination device will reply with a Reply packet. However, by default, firewalls, such as Windows firewall blocks ICMP Echo Requests from the external network and pinging will  work when the firewall is disabled or an exception is created that lets ICMP Echo Requests pass through the firewall.

4 0
3 years ago
Why people like adventures <br><br>​
OLEGan [10]

A lot of people do love going on different kinds of adventures. People do  like adventures because;

  • It helps to improve their physical health and it also hinders/ treat different scope or range of health issues.

  • It helps to make the human brain bigger that is, adventures such as hiking or walking helps to grow the brains.

  • People go on adventures so as to build or raise their tolerance level such as Tolerance for uncertainty.

  • Adventures helps to improve one's reflectiveness and mental skill
  • It gives you new ideas, feeds your dreams and also helps to builds your confidence.

Adventure is simply defined as the act of been involved in an unusual or exciting experience or any activity. It can be hazardous in nature.

Learn more about adventure from

brainly.com/question/25950911

3 0
2 years ago
How do you optimize a website using JavaScript?
GenaCL600 [577]
You can edit the website (using Wordpress) -if it is your website of course-, and code JavaScript commands into the page that’s going to be uploaded.

Check out my website: www.birdbloggersblog.com

I coded that with HTML.
4 0
3 years ago
Other questions:
  • If you purchase a software suite for personal use, you can install the software how many times on how many different machines?
    6·1 answer
  • Catherine wants to search online for fruit juices. She is fine with aerated or fresh fruit juices. Which Boolean operator will e
    12·2 answers
  • The indent buttons on the home tab allow you to increase or decrease paragraph indenting in increments of ____ inches.
    5·1 answer
  • To edit the color of the text in presentation software, choose the Font color command Text Color in the ________ ribbon toolbar.
    15·2 answers
  • Wireless data networks are particularly susceptible to known ciphertext attacks.
    10·1 answer
  • which of the following statements about matter is true a.matter is anything that occupies space and possesses mass b.matter can
    5·2 answers
  • QUESTION 10
    10·2 answers
  • Every finger has a key it should be resting on when you are not typing<br> 1. False<br> 2. True
    12·2 answers
  • What is MVC architecture in relation to developing in web applications? How
    6·1 answer
  • Lattice-based access controls use a two-dimensional matrix to assign authorizations. What are the two dimensions and what are th
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!