1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nata0808 [166]
3 years ago
6

Which option should you select to ignore all tracked changes in a document

Computers and Technology
1 answer:
Natasha_Volkova [10]3 years ago
6 0

Answer:

In the given question some information is missing that is an option that's why we assume that the answer to this question is "Track changes".

Explanation:

The description of the Track changes can be given as below:

  • In computer science, the term "track changes" is a part of the word processing. It is an editing command that is used to create an original document.
  • This command is also used for making changes in the old document file in which we provide editing and make an original document.
  • The Track changes is a part of the Microsoft word. It is on the Review tab.

That's why the answer to this question is "Track changes".

You might be interested in
A(n) is the tool that will help you the most when developing the content you will use in your presentation.
ikadub [295]

Answer:

Outline

Hope it helps :)

Explanation:

7 0
3 years ago
What model involves the creation of data and process models during the development of an application
matrenka [14]

Answer:

Data modeling

Explanation:

Data modeling is a term used in computer or software engineering. It is a technique of creating a data model for an information system through unusual formal methods. It also involves the analysis of models during the development of an application. It is further divided into three places including:

1. Conceptual data

2. Logical data model

3. Physics data model

Hence, Data modeling is a model that involves the creation of data and process models during the development of an application

6 0
3 years ago
We use a cubic equation in which the variables and coefficients all take on values in the set of integers from 0 through p - 1 a
dezoksy [38]

Answer:

We use a cubic equation in which the variables and coefficients all take on values in the set of integers from 0 through p - 1 and in which calculations are performed modulo p for a __Prime Curve_ over Zp.

Explanation:

Two families of elliptic curves are used in cryptographic applications

  1. Binary curves over GF(2m):
  2. Prime Curves over Zp.
4 0
2 years ago
What is the index of 7 in this list?
Ganezh [65]

Answer:

Assuming this is 0 based array indexing, it would look like this...

[ 5, 6, 10, 7, 3, 2.5 ]

[ 0, 1, 2, 3, 4, 5, 6 ]

The index of 7 would be 3.

6 0
3 years ago
1. What are the advantages and disadvantages of technology in communication?
Gennadij [26K]

Answer:

ADVANTAGES:

First, the evolution of technology is beneficial to humans for several reasons. At the medical level, technology can help treat more sick people and consequently save many lives and combat very harmful viruses and bacteria.

2-Technology has also increased the productivity of almost every industry in the world. Thanks to technology, we can even pay with bitcoins instead of using banks

DISADVANTAGES:

1-Lack of Privacy. You might think that a quick text or IM offers more privacy than a telephone call in a crowded room. ...

2-Distraction from Real Life. ...

3-Potential for Misunderstanding. ...

4-Decline of Grammar and Spelling...

5- Near people are far and far people are near through communication technology. we have no time to sit with our relatives but constantly communicate far away people . I think this is biggest <em>disadvantage </em>

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • What term refers to a piece of software that interfaces with the hardware on your computer?
    10·2 answers
  • Which type of message format is designed to arouse curiosity, not showing the product or delivering quite enough information to
    10·1 answer
  • Betrand Meyer developed the ______ programming language which is not type-safe because it violates the law of contravariance.
    9·1 answer
  • You dad has given you his old digital scanner for your new computer. you plug it into the usb drive on your windows 8 computer b
    8·1 answer
  • Robert gets home from school at 3 p.M. His mom has to leave for her shift at work at 3:15 and she wants him to watch his baby br
    9·1 answer
  • 4. What are the ethical issues of using password cracker and recovery tools? Are there any limitations, policies, or regulations
    5·1 answer
  • A plan budget time for studying and activities is referred to as?
    11·1 answer
  • "To speed up magnetic hard drive performance , ___________ is often used. "
    15·1 answer
  • Text Questions
    15·1 answer
  • which one of the following will reach every element in the array a? 1. for(int i = 0; i &lt;= a.length; i++) 2. for(int i = 0; i
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!