1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jenyasd209 [6]
3 years ago
9

Drag each tile to the correct box.

Computers and Technology
1 answer:
My name is Ann [436]3 years ago
4 0

Click Accept or Reject steps involved in accepting all the changes in a document

Click Accept or Reject.

<u>Explanation:</u>

When end user drags and drop title in correct box in an open document. He has accept changes to all. Normally   end user is prompted for accept and reject based on his or her selection documents changes are happened.

End user has to by click on review menu in the open document and he or she has to click on go to first tracked change. Once clicked end user is prompter for to accept the changes. Once changes is accepted next tracked changes is prompted for open document.

You might be interested in
Adam is writing a program that: 1) has the user guess a number, and 2) tells the user how many guesses it took to get the correc
NNADVOKAT [17]

Answer:

There are two ways in which programs ... count-controlled loops; condition-controlled loops ... Sometimes it is necessary for steps to iterate a specific number of times. ... A count-controlled loop is used when the number of iterations to occur is ... the variable 'count' is used to keep track of how many times the algorithm

Explanation:

5 0
2 years ago
Read 2 more answers
___________ is some danger that can exploit a vulnerability.
andreyandreev [35.5K]

<u>Threat </u>is some danger that can exploit a vulnerability.

<h3>What is Threat?</h3>

Threat  is seen as Anything that can be able to take advantage of a vulnerability, intentionally as well as  accidentally, and take or damage, the  asset of a person.

Note that a threat is that which a person or firm is protect against and Vulnerability is seen as Weaknesses.

Therefore, <u>Threat </u>is some danger that can exploit a vulnerability.

Learn more about vulnerability from

brainly.com/question/25633298

#SPJ1

8 0
2 years ago
What is the local portion of the e-mail address below? <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="
abruzzese [7]

Every email address is something like this ...  <u>[email protected]</u>

the name after the @ symbol is a domain name that represents the administrative realm for the mail box and the part before the @symbol identifies the name of the mailbox.

<u>twrigley(local portion)</u>@   gumchewer.biz(domain)

twrigley is the local portion  which indicates to the mail server which mailbox the message is from or to.This portion is only important to gumchewer mail server which is why it is called local.


6 0
3 years ago
Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (a
allsm [11]

Answer:

The code is below. The output is "Eric went to Chipotle to buy 12 different types of Cars"

Explanation:

import java.util.scanner;

public class labprogram {

    public static void main (string [ ] args) {

    scanner scnr = new scanner (system.in) ;

    string firstname;

    string genericlocation;

    int wholenumber;

    string pluralNoun;

   firstName = scnr.next();

   genericLocation = scnr.next();

   wholeNumner = scnr.nextInt();

   pluralNoun = scnr.nextLine();

   system.output.println(firstname + " went to " + genericlocation + " to buy " + wholenumber + " different types of " + pluralnoun + " . ");

}

 }

6 0
3 years ago
After unit and integration testing are completed, _________ testing ensures that all hardware and software components work toget
raketka [301]
Testing ensures that all hardware and software components work together
5 0
3 years ago
Other questions:
  • In 2–3 sentences, describe how you would insert a table into a word-processing document.
    9·2 answers
  • To keep from overwriting existing fields with your Lookup you can use the ____________ clause.
    14·2 answers
  • Help !!!!!
    9·1 answer
  • The site is not allowing me to purchase the subscription. Please help?
    12·1 answer
  • 120
    14·1 answer
  • A student will not be allowed to sit in exam if his/her attendance is less than 75% .
    8·1 answer
  • The complete process for learning through repetition is to read, write, say, rest and revisit the information. Please select the
    12·2 answers
  • If any one answered this i will give brilientst what is stimulation program​
    6·1 answer
  • Information about www
    14·1 answer
  • Select the three subjects studied in sports biomechanics.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!