1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nata0808 [166]
3 years ago
6

Which option should you select to ignore all tracked changes in a document

Computers and Technology
1 answer:
Natasha_Volkova [10]3 years ago
6 0

Answer:

In the given question some information is missing that is an option that's why we assume that the answer to this question is "Track changes".

Explanation:

The description of the Track changes can be given as below:

  • In computer science, the term "track changes" is a part of the word processing. It is an editing command that is used to create an original document.
  • This command is also used for making changes in the old document file in which we provide editing and make an original document.
  • The Track changes is a part of the Microsoft word. It is on the Review tab.

That's why the answer to this question is "Track changes".

You might be interested in
If an ips identifies an attack, it can ________.
Gennadij [26K]

Answer:

a. drop the attack packet(s)

Explanation:

An IPS not only detects and alerts system administrators but it also stops attacks. It is built to consistently monitor a network, report malicious incidents and take preventative actions. So, how does an IPS work exactly? An IPS does a deep packet inspection and either blocks the IP of whoever sent the malicious packet or removes the malicious packet's content and repackages its payloads. Thus, this means that the malicious packet is completely dropped by stripping off of its header information and any infected items in the packet.

5 0
3 years ago
Types of lines in dressmaking
Shtirlitz [24]

Answer:

table of contents/ straight line/horizontal line/diagonal line/zigzag line/curved line(softly)  curved line(fully)  thin line

Explanation:

your welcome

5 0
4 years ago
A device receives a data link frame with data and processes and removes the Ethernet information. What information would be the
il63 [147K]

The information that would be the next to be processed by the receiving device is: IP at the internet layer.

<h3>Internet protocol (IP)</h3>

Internet protocol is a network protocol that help to transmit data to user device across the internet or network which inturn make it possible for user device to connect and communicate over the network.

Internet protocol at the internet layer is a TCP/IP software protocol which sole purpose is to transfer data packets across the internet after receiving and processing the data.

Inconclusion the information that would be the next to be processed by the receiving device is: IP at the internet layer.

Learn more about internet protocol here:brainly.com/question/17820678

7 0
2 years ago
A _______ is used to present data in a simplified, graphical format that allows your audience to read less text while still bein
steposvetlana [31]
Your correct answer would be Legend.


answer choice is B.
3 0
3 years ago
Read 2 more answers
2. 2 extension A file saved in LOGO will have parts 3. Aprocedure consists ofthe file saved if I saved in logo will have instruc
JulijaS [17]

Answer:

The procedure or subprogram must start with the word ‘to’, followed by a name we think of. The next step is to key-in all the same steps we would write on the command line. The procedure must end with the word ‘end’. All comment or remark lines should be preceded by semi-colon (;).

Explanation:

to procedurename steps of your procedure here end

8 0
2 years ago
Other questions:
  • What are some examples for Environmental Technology?
    5·2 answers
  • Identify four basic data manipulations performed on a relational database using sql
    7·1 answer
  • 38. To select nonadjacent items, select the first item, such as a word or paragraph, as usual; then, press and hold down the ___
    8·1 answer
  • Please I need help!!!!!!!
    14·2 answers
  • Someone learn me more American Sign Language (ASL). Please.
    13·1 answer
  • Someone places a chocolate bar near a working radar set that is used to locate ships and airplanes. Which best describes what is
    15·2 answers
  • Asymmetric key encryption combined with the information provided by a. certificate authority allows unique identification of the
    8·1 answer
  • A) Importance of Software Engineering I​
    5·1 answer
  • Which two components are configured via software in order for a PC to participate in a network environment
    5·1 answer
  • How do cyber criminals target user’s end devices?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!