1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AnnZ [28]
3 years ago
9

What tool checks the spelling of each word against the programs internal dictonary?

Computers and Technology
1 answer:
Darina [25.2K]3 years ago
5 0
Answer: Spell checker tool
You might be interested in
A word or line of a paragraph at the top of a page hanging indent is called ______
Iteru [2.4K]

Answer:

The answer is: second line indent

Explanation:

Also known as a second line indent, sets off the first line of a paragraph by positioning it at the margin, and then indenting each subsequent line of the paragraph.

8 0
3 years ago
When you start a new blank document, you begin typing at the
Serhud [2]
C. The insertion poin
6 0
2 years ago
A file to which information is written is referred to as a(n) ____ file.
Iteru [2.4K]
The answer is <span>output.  </span>A file to which information is written is referred to as an output file.  It is  <span>a computer </span>file<span> that contains data that are the </span>output<span> of a device or program. </span>
4 0
2 years ago
Match the following
kakasveta [241]

Answer:

Eraser tool -removes the unwanted part of the drawing.

Row -horizontal space running from left to right.

Text -Primary component of a multimedia.

Drawing Area -Working are of ms point program.

I hope this helps!! Correct me plz if I'm wrong. If I'm right, could you mark me as brainliest?

8 0
2 years ago
Choices.
Svet_ta [14]

Answer:

1. B

2. D

3. C

4. A

5. B

Explanation:

1. To check the integrity of your hard disk and fix various file system errors, the Windows utility which should be implemented is Check disk (Chkdsk). This utility is always used with the command line interface (CLI) with the command "chkdsk."

2. An event or action took place and it caused damage to data, hardware, software and processing capability of the computer. From the statement given, security risks are being described. Any event or action that is capable of causing a problem to a computer system is considered to be a security risk and should be prevented through the use of an appropriate utility software.

3. Virus is a software program that can infect, damage and disrupts the whole computer system.

4. To protect the whole computer system, the software utility which is needed is an Anti-virus.

5. To avoid losing valuable data to your computer, the most important thing to do is to regularly back-up your files.

7 0
2 years ago
Other questions:
  • What feature of Windows Server allows for agentless authentication?
    7·1 answer
  • Help me I'm so confused by this question
    7·1 answer
  • Why are online payment services necessary?
    10·2 answers
  • What do you do when your computer shuts down
    15·2 answers
  • Write a function that takes an integer value and returns the number with its digits reversed. for example, given the number 7631
    10·1 answer
  • All dogs = 199999990158161231
    11·2 answers
  • ................. are used to summarize data (option) (a) report (b) action ​
    12·2 answers
  • Explain the bad effect and good effect of mobile phone and internet.<br>​
    15·2 answers
  • Alvin has created a non-extensive site map of all the commonly visited pages of his website. What is such a site map called?
    13·1 answer
  • Write the importance of program in computer​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!