1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scrat [10]
3 years ago
13

Which of the following tools helps ensure your document will open in older versions of word

Computers and Technology
1 answer:
Alexus [3.1K]3 years ago
4 0

Answer:

Compatibility Check

Explanation:

  • Select File > Info.

  • In the Inspect Document section, select Check for Issues > <em>Check Compatibility.</em>

  • Click Select versions to show. A check mark that appears next to the name of the mode that the document is in.

You might be interested in
Write a method that takes two circles, and returns the sum of the areas of the circles.
11111nata11111 [884]

Answer:

public static double areaSum(Circle c1, Circle c2){

 double c1Radius = c1.getRadius();

 double c2Radius = c2.getRadius();

 return Math.PI * (Math.pow(c1Radius, 2) + Math.pow(c2Radius, 2));

public static void main(String[] args){

 Circle c1 = new Circle(6.0);

 Circle c2 = new Circle(8.0);

  areaSum(c1,c2);

 }

Explanation:

7 0
3 years ago
Choices.
Svet_ta [14]

Answer:

1. B

2. D

3. C

4. A

5. B

Explanation:

1. To check the integrity of your hard disk and fix various file system errors, the Windows utility which should be implemented is Check disk (Chkdsk). This utility is always used with the command line interface (CLI) with the command "chkdsk."

2. An event or action took place and it caused damage to data, hardware, software and processing capability of the computer. From the statement given, security risks are being described. Any event or action that is capable of causing a problem to a computer system is considered to be a security risk and should be prevented through the use of an appropriate utility software.

3. Virus is a software program that can infect, damage and disrupts the whole computer system.

4. To protect the whole computer system, the software utility which is needed is an Anti-virus.

5. To avoid losing valuable data to your computer, the most important thing to do is to regularly back-up your files.

7 0
3 years ago
3. By default, Blender® remembers your last 32 actions and allows you to undo them one at a time by pressing CTRL+Z. (1 point)
Setler [38]
Answers:

(3) True
(4) Num Lock

Explanations:
(3) To undo any task in most of the softwares including Blender, CTRL + Z is used. If you want to double check, go to preference ->  Input -> Search for undo. You would see CTRL + Z shortcut there for one time undo (as shown in the picture 1 attached.) Hence (TRUE).

(4) As in blender, during the scene creation, the designers usually use top, left, right or bottom view. Blender has the built-in keys set for those views. As you can see in the second image that the Top view is set to NumPad 7 (likewise others set to other numbers). In order to use the those numpad numbers, you must turn on the NumLock! Hence NumLock is the answer.

3 0
4 years ago
Everfi module 7 answers
Nat2105 [25]
What is the question?
7 0
3 years ago
Which of the following forces all traffic, communications, and activities through a single pathway or channel that can be used t
Ad libitum [116K]

Answer:

Option b. Choke point

Explanation:

In firewall, a choke point can be defined as a single point which allows all of the network traffic including incoming and outgoing to be funneled. As the passage of the whole traffic through the choke point regulates the flow as it focus monitoring  and controls bandwidth consumption, provides authentication, control efforts like Internet firewalls.

7 0
3 years ago
Other questions:
  • Prior to the development of e-commerce, web sites primarily delivered static html pages. true
    11·1 answer
  • Create a program that reads words.txt (link near top of our home page) in order to: determine the length of the longest word(s)
    14·1 answer
  • Select the correct answer. Linda has written a program that works well on various operating systems, but she needs to increase t
    10·1 answer
  • 2. Name the three building blocks of design that pertain to form.
    7·1 answer
  • The first query is computationally less expensive than the second query. (Assume no indexes exist on release_date.) Query 1: SEL
    11·1 answer
  • Fill in the missing step in the following deadlock situation. Two users from the local board of education are each running a pro
    11·1 answer
  • Which of the following accurately describe the
    9·2 answers
  • You’re having trouble connecting to the Internet so you call your Internet service provider for help. They need to know the perm
    15·1 answer
  • Taking control of admin functionality and misusing sensitive data that are unauthorized to access are due to.
    8·1 answer
  • Ginny just enrolled in a C-SNP that uses the post-enrollment verification method. When will the plan send her a termination noti
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!