1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Liula [17]
3 years ago
8

Which option should you select to accept a tracked change? A. Accept B. Reject C. Review D. Delete

Computers and Technology
2 answers:
TiliK225 [7]3 years ago
5 0
Your answer that your looking for it letter A! I hope this helped c:
user100 [1]3 years ago
3 0

Answer:

Accept is the option that needs to be used to accept the tracked changes.

Explanation:

It means that the tracked changes are right and can be accepted for further process.

Reject: This should be used only when there is an ambiguity or something went wrong in tracked changes.

Review: This option should be chosen only when the tracked change has to be monitored once again to validate the information provided.

Delete: This is to “delete the tracked changes” which are no more needed.

You might be interested in
What is the term used to describe data sets are so large and complex that they become difficult to process using traditional dat
slega [8]

Answer:

Big Data

Explanation:

Big Data refers to data sets that are large, comprising of different varieties (structured and unstructured data types) and which cannot be processed by the day to day database management systems and computer software otherwise referred to as traditional software and techniques.

The term Big does not necessarily refer to a particular size that a dataset must attain but describes the nature of the dataset and the fact that traditional database management systems cannot be used to process them take for example

The datasets of the entire product list from amazon

5 0
3 years ago
The ______________ shows that you have fully researched the topic and gives you a chance to prove your claim.
Anestetic [448]

Answer:

D. Topic Sentence

Explanation:

4 0
2 years ago
Show what this program prints. Be exact and complete. Can you explain the behavior of each print statement? 1 2 3 4 5 6 7 public
KengaRu [80]

Answer:

39 + 3

42

393

Explanation:

In this line System.out.println("39 + 3"), the quotation marks are used to delimit a string, then when printed in the console the string is printed as-is.

In the next line: System.out.println(39 + 3), without the quotation marks, the 39+3 is treated as a normal addition and prints the result of the operation.

In the last line printed with the code System.out.println("39" + 3,; the symbol + is used to concatenate the string 39 with the number 3, since the string has no spaces they are printed together.

3 0
3 years ago
_______ is a communications protocol used to send information over the web. HyperText Markup Language (HTML). URL (Uniform Resou
nlexa [21]

TCP/IP is a communications protocol used to send information over the web.

Explanation:

TCP / IP, which stands for the Transmission Control Protocol / Internet Protocol, is a set of communication protocols used to connect internet network devices. The whole suite of the Internet Protocol — a set of rules and procedures — is commonly called TCP / IP.  

The TCP / IP protocol suite acts as a layer of abstraction between web applications and the routing / switching fabric. TCP / IP defines how data is shared over the internet by supplying end-to-end communications that specify how the data should be split into packets, signed, distributed, routed and received at the destination.

5 0
3 years ago
What's the risk or effect of software piracy?
slamgirl [31]
You can go to jail get in alot of trouble plus you always have a chance of letting a virus into yoru computer
7 0
3 years ago
Read 2 more answers
Other questions:
  • What was the second phone?
    14·1 answer
  • Which devices are managed through device management?
    15·2 answers
  • 1. When centering one paragraph on a page of text, the user needs to _____.
    15·2 answers
  • ____ is a practice where a user in enticed by possible rewards and then asked to provide personal information.
    14·1 answer
  • Which type of malware can hijack internal windows components and often goes undetected because it is already loaded when the ant
    14·1 answer
  • Which segment of society introduced the grunge look?
    5·2 answers
  • There is usually a positive side and a negative side to each technology improvement. Select a technology you use every day and c
    5·1 answer
  • How to use emojis on chromebook without on-screen keyboard
    14·1 answer
  • Types of Hazards Mitigation Measures
    8·2 answers
  • What represents a user’s specific preferences?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!