1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
s344n2d4d5 [400]
3 years ago
15

When you begin typing text, the _________________________ appears on the status bar with an animated pencil writing on paper tha

t indicates word is checking for spelling and grammar errors?
Computers and Technology
1 answer:
melomori [17]3 years ago
3 0
Spelling and grammar check icons
You might be interested in
What does this result prove about the computer’s network connectivity?
Anna007 [38]
It can prove or disprove the fact that your computer is connected it the internet by in turn whether you can do almost anything
7 0
3 years ago
Advantages of Linux include_____.
Assoli18 [71]

Answer:

The ability to tweak an application, and i think security. I've barely scratched the surface of linux so my answer may not be 100% accurate

Explanation:

8 0
3 years ago
Where are Micro USB connectors used the most?
jeka94

Answer:

desktops............

3 0
3 years ago
Read 2 more answers
What do you understand by structured programmingapproach? Also Discuss about bottom up and top down approach.
mart [117]

Answer:

Structured programming also known as Modular programming in which the program is made as a single structure.The execution is instruction by instruction.It mainly focuses on improving the quality,clarity and development time of a computer program.

The top-down approach works by breaking a complex algorithm into smaller parts called modules. The modules keep breaking until there is no space left for breaking them without hindering the originality.The breaking of the modules is prohibited after achieving a certain level of modularity . C language uses this approach.

Bottom up works exactly opposite of how the top-down approach works.This approach works in the most elemental level of solving a problem and going up with combination of several parts of the solution to achieve required results.

4 0
3 years ago
Which are among the ways you can use bitlocker encryption? (choose all that apply?
igor_vitrenko [27]
There is a lot of ways that you can use the bit locker encryption. Some are when you are authenticating your computer using a TPM. Or when you are authenticating your account using a USB Flash drive, and most on the phones authentication through text messages and all.
3 0
3 years ago
Other questions:
  • What does limited access to a document mean?
    14·2 answers
  • What is the internet?
    5·2 answers
  • In a ring-based system, procedure p is executing and needs to invoke procedure q. Procedure q's access bracket is (5,6,9). In wh
    15·2 answers
  • What is Administrator windows 10
    8·1 answer
  • What are some strategies that you can use when you debug a program?
    11·1 answer
  • What are the advantages and disadvantages of fortran?
    13·1 answer
  • Credible sites contain __________ information,
    7·2 answers
  • Do you think Mortal Combat is cool?
    10·2 answers
  • What is a for command? can u use a variable instead of a number in the for command!<br>​
    14·1 answer
  • STM-1 contains 63 primary 2-Mbps data streams and each of them contains 30 time slots for speech.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!