1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nata0808 [166]
3 years ago
6

Which option should you select to ignore all tracked changes in a document

Computers and Technology
1 answer:
Natasha_Volkova [10]3 years ago
6 0

Answer:

In the given question some information is missing that is an option that's why we assume that the answer to this question is "Track changes".

Explanation:

The description of the Track changes can be given as below:

  • In computer science, the term "track changes" is a part of the word processing. It is an editing command that is used to create an original document.
  • This command is also used for making changes in the old document file in which we provide editing and make an original document.
  • The Track changes is a part of the Microsoft word. It is on the Review tab.

That's why the answer to this question is "Track changes".

You might be interested in
I want pizzzzzzzaaaaaaaaaaa
hjlf
Sameeeeeeeeeeeeeeeeeeeee
8 0
3 years ago
What is the name given a technological program that typically copies itself and moves through a computer system in order to disr
goldfiish [28.3K]

Answer:

Class of software called "malware"

Explanation:

Some features of malware software:

  • Viruses, worms, Trojans and bots are malware.
  •  Malware is the abbreviation for "malicious software" (malicious code).
  •  Specifically designed to damage, interrupt, illegally steal data from a network.
  • A Trojan it is  software that looks legitimate. Users are typically tricked into loading and executing it on their systems.  

7 0
3 years ago
Information flows:
Anna11 [10]

Answer:

e.

Explanation:

Information flow refers to the back and forth movement of information between different people and systems in order to communicate and perform different decision making processes. Information flows between and among supply and other internal functions and external sources. Information flow is used in just about everywhere in the world.

6 0
3 years ago
Erewrxdnnefwn q wedsvd
Alexus [3.1K]

Answer:

hahahahahhahahahahhaha

6 0
3 years ago
The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulner
gayaneshka [121]

Answer:

D. Network vulnerability database

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

In this scenario, The director of security at an organization has begun reviewing vulnerability scanner results and notices a wide range of vulnerabilities scattered across the company. Most systems appear to have OS patches applied on a consistent basis but there is a large variety of best practices that do not appear to be in place. Thus, to ensure all systems are adhering to common security standards a Network vulnerability database, which typically comprises of security-related software errors, names of software, misconfigurations, impact metrics, and security checklist references should be used.

Basically, the Network vulnerability database collects, maintain and share information about various security-related vulnerabilities on computer systems and software programs.

5 0
3 years ago
Other questions:
  • HELP ASAP!!!!!!!!! ITS A UNIT TEST: WILL MARK AS BRAINLIEST>
    13·1 answer
  • Create a text file that contains your expenses for last month in the following categories: • Rent • Gas • Food • Clothing • Car
    13·1 answer
  • A power supply unit for a computer converts:
    7·1 answer
  • Which of the following should you NOT do when using CSS3 properties to create text columns for an article element? a. make the c
    12·2 answers
  • Before you give your presentation to an audience, you should make sure that your ideas are organized in a clear and meaningful w
    8·2 answers
  • What is the main feature of chat rooms?
    9·2 answers
  • What area displays the title of the document
    14·1 answer
  • 20 POINTS AND BRAINLIEST TO CORRECT ANSWER
    15·2 answers
  • Match the component to its function. resistor inductor capacitor battery transistor This component stores a temporary charge. ar
    7·2 answers
  • Write a static method reOrder56(int[] nums) that return an array that contains exactly the same numbers as the given array, but
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!