1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gelneren [198K]
3 years ago
5

What is the most efficient way to prevent the spelling checker from repeatedly flagging a correctly spelled name in all of your

documents? Click the Ignore All button the first time the word is flagged in each document. Add the word to the spelling checker dictionary. Click the Ignore Once button every time the word is flagged in each document. Click the Change All button the first time the word is flagged in each document.
Computers and Technology
1 answer:
kiruha [24]3 years ago
4 0

Click the Ignore All button the first time the word is flagged in each document.

<u>Explanation:</u>

Click the Ignore All button the first time the word is flagged in each document – This option best suit since the word is expected to be used frequently, it should ignore in all occurrences of the document.

Whereas other shouldn’t add because this task is permanent and we don’t want it to happen once again in another word document.  This is a time consuming process and will reduce the productivity.

Click the Change All button the first time the word is flagged in each document option should be used only when we replace all occurrences .

You might be interested in
The computer system for a major retail store was hacked. Many addresses, credit card numbers, and other pieces of customers’ per
drek231 [11]

Answer

Cyber Security professionals

Explanation

Cyber security professionals can help the company protect itself from hackers. They are experts who will install antivirus into the software used in the company to protect virus manipulation and prevent malware. They will further encrypt the websites of the company and reset the password of the computers into two-factor authentications to make the login requirements advanced.


7 0
3 years ago
Read 2 more answers
Danny is editing the text content of a single page on a website he created a year ago. What part of the tag would he have to upd
Verdich [7]
<h2>"<lastmod>" is the right choice for the given scenario</h2>

Explanation:

<update> This tag does not belong to <URL> tag of the site map. Hence this option goes invalid.

<lastmod> This gives details of the date and time when the website content was changed. It will be in "W3C Date time format". This may omit time at times. This is the write answer.

<loc> This contains the URL of the web page.

<changefreq>: How frequently the "web page is likely to get modified". The  values which it accepts are: "monthly, always , daily , weekly ,hourly, yearly , never"

5 0
3 years ago
The most likely reason that company computers connected to the Internet should use anti-virus protection software is..?
gogolik [260]
A big/potent virus could eliminate economic statuses/money, maybe bankrupting the company. 
4 0
3 years ago
Sorting and filtering are two ways to _____ data.
Tamiku [17]
Store data. do you have options?
6 0
3 years ago
Read 2 more answers
show how one version of the technology is an improvement over a previous iteration of that same technology
Romashka-Z-Leto [24]
This question has a ton of answers to it but, here are some basic ideas to help you out
- Cars 1900's vs today
- Computers 1980's vs today
- Guns 1800's vs today
- Televisions 1900's vs today
- Telescopes/Microscopes
7 0
3 years ago
Other questions:
  • Assure that major, minor, sub1 and sub2 each contain four digit numbersIf less than four digits are entered in major OR minor OR
    5·1 answer
  • What is a gutter margin?
    5·2 answers
  • The CUSTOMERS and SALES tables contain these columns:
    6·1 answer
  • IDE devices require the use of a controller mounted on the motherboard. True False
    14·2 answers
  • Examine the following algorithm.
    9·1 answer
  • A student is browsing a website. While browsing, he click on a link that takes him to another website. Which code gives the corr
    14·1 answer
  • Employers can use spyware to track program usage by employees.
    12·1 answer
  • 4.(L.5.1.A) Select the sentence that includes an interjection,
    12·1 answer
  • What defines the scope of a project?
    5·1 answer
  • When you try to move the desktop icon using the click and drag method and it doesn't move, what is the reason?​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!