1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nata0808 [166]
3 years ago
6

Which option should you select to ignore all tracked changes in a document

Computers and Technology
1 answer:
Natasha_Volkova [10]3 years ago
6 0

Answer:

In the given question some information is missing that is an option that's why we assume that the answer to this question is "Track changes".

Explanation:

The description of the Track changes can be given as below:

  • In computer science, the term "track changes" is a part of the word processing. It is an editing command that is used to create an original document.
  • This command is also used for making changes in the old document file in which we provide editing and make an original document.
  • The Track changes is a part of the Microsoft word. It is on the Review tab.

That's why the answer to this question is "Track changes".

You might be interested in
True/False: If a function is legally prototyped to return an integer value, it can return a structure member that is an integer
sdas [7]
#1) If a function is legally prototyped to return an integer value, it can return a structure member that is an integer data type.
Answer: True. Any method that is not declared void must contain a return statement with a corresponding return value. The data type of the return value must match the method's declared return type; you can't return an integer value from a method declared to return a boolean.
5 0
2 years ago
An example of what you can post that shows kindness to other
harina [27]

Answer:

everybody is awesome

Explanation:

5 0
2 years ago
What type of data causes concern for institutions are businesses Lincoln elected stored and not secured properly
Kobotan [32]

The type of data which causes concern for institutions or business when collected, stored, and not secured properly is Personal Identifying Information. The correct option is B.

<h3>What is personal identifying information?</h3>

A personal identifying information is the representation of data or information  of an individual that can be used to identify an individual specifically.

Some examples of a personal identifying information includes Social security number (SSN), E-mail address, Driver's license number. Bank account number, Full name and Passport number.

Business organizations should secure personal identifying information  properly, in order to avoid unauthorized access by hackers.

Thus, the correct option is B.

Learn more about personal identifying information.

brainly.com/question/4997276

#SPJ1

6 0
2 years ago
Given the string variable address, write an expression that returns the position of the first occurrence of the string avenue in
Delicious77 [7]
It depends on a language you code. I think this could be either C++ or Java. I know answer for both of them.
For C++:  <span>address.find("Avenue")
For Java: </span><span>address.indexOf("Avenue")</span>
4 0
2 years ago
What frequency band is used by bluetooth, 802.11b, and 802.11g?
bagirrra123 [75]
802.11 is a Wi-Fi standard, not a frequency, both of those operate at 2.4 GHz. Bluetooth operates at frequencies between 2402 and 2480 MHz, or 2400 and 2483.5 MHz. 
4 0
2 years ago
Other questions:
  • Why is the protocol down, even though you issued the no shutdown command for interface vlan 99?
    5·2 answers
  • Which of the following would be a considered a want rather than a need for most people?
    15·1 answer
  • Tips for being confident and entertaining when presenting?
    6·1 answer
  • What is the correct process for selecting an entire row in a spreadsheet?
    8·2 answers
  • Explain how software is distinct from hardware.
    8·2 answers
  • Where does the list of incoming mail appear in gmail
    13·2 answers
  • Select the correct answer.
    5·2 answers
  • Aubrey uses the following formula to calculate a required value. Which elements of the formula use mixed cell referencing?
    13·2 answers
  • Why do you think that network and telecommunications security careers are some of the fastest growing in the field of technology
    8·1 answer
  • PLZZZ HELP!!!!!!!
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!