1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga2289 [7]
3 years ago
15

What are some options available in the Spelling and Grammar Checker? Check all that apply. Change and Change All Redo and Repeat

Ignore Once and Ignore All Add to Dictionary AutoFormat Font AutoCorrect Undo
Computers and Technology
2 answers:
Elodia [21]3 years ago
8 0

add to dictionary

ignore once

ignore all

autocorrect

change

change all


Kitty [74]3 years ago
8 0

Answer:

ignore all

ignore once

add to dictionary

Explanation:

i got it right

You might be interested in
HELP ME PLEASE !!!!!
aalyn [17]

Answer:

C

Explanation:

6 0
3 years ago
What protocol suite below is the most commonly used protocol for local area network (lan) communication?
grandymaker [24]
Answer TCP/IP is the most common protocol in Local Area Networks.
3 0
4 years ago
James would like to send a document he has saved on the hard drive to coworkers and Ireland Brazil and India. These coworkers ha
frozen [14]
Email the document to them ?

8 0
4 years ago
Read 2 more answers
What is machine level language ?​
NeX [460]

Answer:

The machine-level language is a language that consists of a set of instructions that are in the binary form 0 or 1.

5 0
3 years ago
Regression testing should be a normal part of integration testing because as a new module is added to the system new
nikklg [1K]
It's E) both A and B A) Control logic is invoked B) Data flow paths are established
7 0
3 years ago
Other questions:
  • If no other row matches, the router will select the ________ row as its best match. First Last either First or Last, depending o
    12·1 answer
  • The picture that graphically represents the items you use in Windows is called a/an
    12·2 answers
  • Generally considered to be the most important information security policies, what item below defines the actions a user may perf
    15·1 answer
  • When forced distribution is used to reduce leniency bias, this can cause __________ if a pfp system is in place?
    10·1 answer
  • Which of the following things would you access from the Program & Courses page? Course descriptions Tutorial videos Account
    7·1 answer
  • Write an application that asks a user to type an even number or the sentinel value 999 to stop. When the user types an even numb
    8·2 answers
  • The Gramm-Leach-Bliley Act contains a rule that ensures security and confidentiality of customer information, protects against a
    7·2 answers
  • Short note on first generation computer​
    10·1 answer
  • You are assigned by your teacher to perform the assembly of all the parts of the computer in preparation for the hands on activi
    7·1 answer
  • The view that perceptual processes take place over time and can be thought of in terms of a software/hardware metaphor is known
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!