1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kumpel [21]
3 years ago
7

After fixing the format of her subheadings, she notices that she misspelled the name of one of the famous people

Computers and Technology
2 answers:
castortr0y [4]3 years ago
5 0

Answer:

Go to the Editing command group and use the Find and Replace feature.

Explanation: I took the quiz

Setler [38]3 years ago
3 0

Answer:

go to the ending command group and using the find and replace feature

Explanation:it’s right trust me

You might be interested in
When you're working with a word processing document and you press the del key, what happens?
LuckyWell [14K]
The correct answer is C.
6 0
3 years ago
when a stock or bond certificate is delivered, it must be in good transferable form. if the certificate is badly mutilated, it m
Elena-2011 [213]

Authentication can be done by the issuer of the security.

What do you mean by authentication?

Authentication is the act of proving an assertion, such as a computer system user's identification. Authentication is the process of verifying a person's or thing's identity, as opposed to identification, which is the act of indicating that identity. It could entail validating personal identification documents, verifying the authenticity of a website with a digital certificate, carbon dating an artefact, or guaranteeing that a product or document is not counterfeit.

Only a party with access to particular company documents may authenticate a mutilated certificate. It is most likely the issuer, but it could also be the transfer agent or registrar.

To learn more about authentication
brainly.com/question/28240257

#SPJ4

6 0
1 year ago
In distributed dos attacks, the attacker sends messages directly to ________. bots the intended victim of the dos attack backdoo
kirill115 [55]
The word DoS refers to the Disk Operating System. In the case given above, if it happens that there is a distributed DoS attack, the attacker then sends messages directly to the BOTS. Bots refer to internet or web robots. Hope this answer helps. The answer is the first option.
4 0
3 years ago
A technician wants to update the organization's disaster recovery plans. Which of the following will allow network devices to be
Illusion [34]

Answer:B) Archives/backups

Explanation: Archive is the group of records of data that are saved for the future use.These are the historic data that is not currently used in the actual location .

Backup is the the the copy of the group of data that is not in the original form to be used in future. Thus the correct option is option(B).

Updating of the plans by the technician cannot be done through other given options because they don't hold the historic records of the data for the renewing of the plans.

6 0
3 years ago
Please tell fast plzzzzzz.​
lana [24]

Answer:

True

Explanation:

4 0
2 years ago
Other questions:
  • HELP I don't understand this
    14·2 answers
  • A. experiment by purposely misconfiguring the gateway address on pc-a to 10.0.0.1. what happens when you try and ping from pc-b
    14·1 answer
  • If you delete a file from removable media, it is stored in the recycle bin where you can recover it until you empty the recycle
    13·1 answer
  • Find the area of the regular hexagon below by using the area formula for triangles.
    7·1 answer
  • Write a class named Accumulator containing: An instance variable named sum of type integer. A constructor that accepts an intege
    14·1 answer
  • One blog may have a greater social influence than another when it has_______?
    12·2 answers
  • What type of maintenance is required of a computer’s power supply to ensure that it remains in working order?
    15·2 answers
  • Type the correct answer in the box. Spell the word correctly.
    15·2 answers
  • Importance of computer​
    15·1 answer
  • Hi there! I am writing a code to make a square using a drone, however I’m having trouble doing so. The website that I’m writing
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!