1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
My name is Ann [436]
3 years ago
10

Misspelet errors are displays with a ..... below them​

Computers and Technology
1 answer:
kkurt [141]3 years ago
3 0

Answer:

The are displayed with red lines below them

You might be interested in
What methods do phishing and spoofing scammers use?
Misha Larkins [42]

Answer:

please give me brainlist and follow

Explanation:

There are various phishing techniques used by attackers:

Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information

4 0
2 years ago
Select two netiquette guidelines. In three to five sentences, explain why these guidelines make professional online communicatio
abruzzese [7]
"Avoiding sarcasm" and "using appropriate language" make professional online communication more effective. Not all people immediately understand one's sarcasm especially someone you recently knew. They may misinterpret the message you're giving so better say something straightforward to make yourself clear. A place where people can easily gather, the internet can make people against you if you're displaying rude and foul comments. Failure to communicate will then follow. If you follow these two guidelines, you're going to be saved from all the troubles.
8 0
3 years ago
Now, my Laptop has been working since I bought it yesterday it won’t start up and it when it does it overheats and shuts off, th
tekilochka [14]

I would bring it back since it’s not working. No way would I spend hard earned money on something that doesn’t work.

Hope this helps.

7 0
3 years ago
Read 2 more answers
Which of the following would a cyber criminal most likely do once they gained access to a user id and password
Bogdan [553]

Answer:

do something wrong as you

3 0
2 years ago
On an ATM network, how is the path that data will take determined?
Bingel [31]

Answer:

The path that data will take is determined by the switches.

Explanation:-

On ATM(Asynchronous Transfer Mode) Network switches determine the optimal path between the sender and the receiver then establish the path between them before the transmission of data.These  switches with the help of algorithm finds the best route for the data transmission.

3 0
3 years ago
Other questions:
  • How does the game Clash Royale keep players continuously active and engaged?
    15·1 answer
  • What key is used to create spaces between lines within a document?
    8·1 answer
  • The best way to achieve stronger encryption is to
    13·1 answer
  • Explain the basic method for implementing paging.
    13·1 answer
  • Which of the following extends a network over a large geographic area by connecting local area networks together?
    14·2 answers
  • A ____ resembles a circle of computers that communicate with each other.
    14·1 answer
  • Application area of word processor?​
    8·2 answers
  • Giving brainliest if you answer question.
    8·1 answer
  • What are the two types of electronic components
    15·2 answers
  • Javier downloads an illustration from an online Image library and modifies it for his purposes. The illustration he downloads is
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!