1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WARRIOR [948]
3 years ago
8

To locate all locations in a document with the word "employer" and replace it with "company," you should use the _____ function.

Computers and Technology
1 answer:
grandymaker [24]3 years ago
6 0
That should be the replace function which performs word replacements in documents.
You might be interested in
How did hitles rules in nazi germany exemplify totiltarian rule?
ddd [48]

Answer:

hope this helps if not srry

7 0
2 years ago
Can you shoot video on the Olympus E-410?
Masja [62]
Yes you must update or do something first but then you can
6 0
3 years ago
Read 2 more answers
What is peopleware?<br>need help​
Oksana_A [137]

Answer:

Peopleware is a term used to refer to one of the three core aspects of computer technology, the other two being hardware and software.

3 0
3 years ago
ethics and internal control are important applications in accounting . Provide FIVE code of ethics and five internal control mea
IceJOKER [234]
Ethics:
- to ensure that privacy will not be lost.
-ensuring personal information is not lost
-information in the accountings will not be submitted or shared with anyone
-information will be saved and viewed by the business.
- The business will not falsely make the accountings.
6 0
3 years ago
Rony works on several confidential files for his company. Ignoring the privacy requirements, Rony places the files in a shared f
kumpel [21]

Answer:

D. ​He should designate all the files in the shared folder as read-only.

Explanation:

The steps Rony should take while using a peer-to-peer (P2P) network to prevent his original files from being overwritten by another P2P user is that He will make the file as read-only.

In making the file read-only, other users who have access to the shared folder can only read the file without modifying it's content.

By default, he is already the owner of the file, so option B is not the correct answer.

Also making the file executable give other users higher privilege, so option A is also not correct.

8 0
3 years ago
Other questions:
  • EBay buyers voluntarily comment to other users and sellers on the quality of service, promptness of shipping, and their general
    5·1 answer
  • What are some examples of environmental technology
    8·1 answer
  • Noticing his reduced performance at work, Dan enrolled himself for training sessions offered by the company and saw his producti
    13·1 answer
  • I have an airsoft pistol and I needed to take it apart to repair it and I lost some screws that were tiny and I dont know what t
    14·1 answer
  • Who was the creator of the game Fnaf?
    11·2 answers
  • The number of pixels displayed on the screen is known as ________.
    13·1 answer
  • Choose the correct answer
    6·1 answer
  • How do we Rewrite the following Python code to avoid error. mark=inpt("enter your mark ")
    6·1 answer
  • What is a common indicator of a phishing attempt cyber awareness 2022
    9·1 answer
  • Ethics related to all <br> artificial intelligence?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!