To check spelling<span> in a </span>Word<span> document, open up the document, head to the “Review” tab, then click on “</span>Spelling<span> & Grammar” (part of the “Proofing” group of tools).
</span>
Answer:
B. Card reader.
Explanation:
Peripheral devices are generally auxiliary devices such as mouse, keyboard, card reader, pen drives, microphones, graphics cards, etc. that are connected with the computer are work in some way with it. In Point of sale (POS) devices card reader are used to read debit or credit cards.
Answer:
B. Role-based access controls
Explanation:
Roll-based access control is a way to control access to the network and to data which depends on the position of employees in a department. This way the permission to access information are granted according to roles that are assigned to employees. This type of access control allows access privileges to employees only to the folders and data files which they need in order to perform their tasks and it does not allow them to access the data or information which is not relevant to them. This helps the department to secure the sensitive information and data files and reduces the risk of data breaches.
Answer:
La programación estructurada está diseñada para enfocarse en el proceso / estructura lógica y luego en los datos requeridos para ese proceso. La programación orientada a objetos está diseñada para centrarse en los datos. ... La programación orientada a objetos admite herencia, encapsulación, abstracción, polimorfismo
Explanation: