1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brrunno [24]
3 years ago
6

To specify AutoCorrect rules and exceptions to the rules, click File to open the Backstage view, click ____ , and then click Pro

ofing in the dialog box that displays.
Computers and Technology
1 answer:
Mumz [18]3 years ago
4 0
To specify Autocorrest rules and exceptions to the rules, Click FIle to open the Backstage View, Click "Access OPtion" on the office button menu and then lastly click "Proofing" in the dialog box that displays
You might be interested in
What is the check digit for the following original product number: 140501941 ? *
Natasha_Volkova [10]

Explanation:

I think it is 7, but I could be wrong..... sorry

8 0
3 years ago
Read 2 more answers
An important principle in information security is the concept of layers of security, which is often referred to as layered secur
Eva8 [605]

Answer:

Available options in question are

  1. a firewall :  
  2. a server
  3. an application
  4. control standard

Answer is : Control Standard. It is not an example of layer of security.

Explanation:

Defense in depth consists of three major domains like physical, technical and administrative. Layered Security will consists of best practices by combining multiple  security methods to mitigate vulnerabilities and attack vectors. It is used to protect resources at different levels.  

  • A firewall is used as layered security measure to secure networks and systems.It is most commonly used security measure for enterprise products.
  • A server is typical example of physical control. In this  it protects actual IT servers, high-end servers, cloud servers and any physical hardware and assets.  
  • An Application can be used an example of Layer security. Applications like Antiviruses, Vulnerability Scanners, Anti Malware software and Web Application firewall gateways are typical examples

Control Standard is not an example of Layered Security.

5 0
3 years ago
Which of the following statements is NOT a valid way to create a date object named birthday?
dem82 [27]

Answer:

var birthday = "12/2/1978";

Explanation:

It does not create a date object named birthday because in this statement the birthday is a string which contains 12/2/1978 a date it is not date object it is a string.All other three options are correct way to create a date object.

var birthday = new Date();

creates a date object with the current date and time.

we can also pass date string in the new Date().So var birthday = new Date("12/2/1978"); is also correct.

we can also pass year,month,day in new Date() In this order only.So option fourth is also correct.

4 0
3 years ago
How can I get answers on Collage Board for AP classes when using the inspect element? (AP WORLD HISTORY)
algol13

Answer:

Answer:

You cannot do anything with the inspect element in reality for finding the answers on the College Board for the AP classes. The inspect classes are powerful tools that are hidden inside the browser. You are required to right-click on the web page, and you will then find the innards of that site, the complete source code, as well as the images and the CSS. as well as the icons that it makes use of. and much more. However, by the end of the day. and till morning, you will not be able to find the solution. For finding the answers on the College Board for AP classes. like here the AP world history, you need to understand World history. and for that, you need to read books and then you will come to know the keywords. And once you have the keyword, you can then find the answer to the questions based on those keywords. Hence, its the subject knowledge that matters, and not inspects element which is more of a developer's tool and not a researcher. You can use Search engine commands however as well. And you can post the questions here, and the whole community is here to help you and ensure you get through the AP classes that you deserve. And I will add, best of luck and you will achieve what you deserve.

Explanation:

Please check this as well: https://apstudents.collegeboard.org/ap/pdf/ap-world-history-modern-course-and-exam-description.pdf

4 0
3 years ago
Hard disk is a sequential data access medium. true or false?​
Crazy boy [7]

My answer is TRUE

Explanation:

Hope it help!!

3 0
3 years ago
Other questions:
  • When a person buys something from an app store, the cost of the item is charged to a credit card whose number often is known by
    5·1 answer
  • Luentifying message rullidl Upuuns
    12·1 answer
  • The rod and crankshaft convert the up-and-down motion of the piston into
    5·2 answers
  • Which type of styles can be applied to a word, phrase, or sentence?
    7·1 answer
  • Assuming that we only support BEQ and ADD instructions, discuss how changes in the given latency of this resource affect the cyc
    7·1 answer
  • kieran wants to search a database quickly for information on the last time a patient came to his medical facility.The informatio
    14·2 answers
  • What gaming PC should I get
    14·2 answers
  • I made a mistake. I'm building my first PC and I bought a Ryzen 7 3800x and planning on getting a 2070 super (if I can). What I
    9·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    13·1 answer
  • 2. Create 4 riddleson keywords which is related to fire wall.​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!