1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vfiekz [6]
3 years ago
6

If you do a Find and Replace for a term, where will Word begin looking for the term?

Computers and Technology
1 answer:
Norma-Jean [14]3 years ago
6 0

Answer:

It automatically begins at the start of the document.

If you're using a search box, It will begin at the insertion point.

Explanation:

{}

You might be interested in
_____________________ denotes the use of human interactions to gain any kind of desired access. Most often, this term involves e
pishuonlain [190]

Answer:

Social engineering

Explanation:

<u>Social engineering</u> involves exploiting existing relationships and <u>manipulating people to reveal certain confidential information or to grant access to such information, systems, or networks</u>, usually for fraudulent reasons.

4 0
3 years ago
You can use a minus sign to make a negative numberlike -2. What happens to each of the following 2++2
Nostrana [21]
2 - -2 = 4
2 + -2 = 0
2 - +2 = 0
:)
6 0
3 years ago
What are the design concepts and assumptions behind a class, an object and the relationship between them? What are the roles met
Triss [41]

Answer:

Object-oriented programming (OOP) is a procedural language and based on classes associated with an object. Without classes and object relationship OOP is not possible. According to program's design concept classes provide abstraction and encapsulation with the help of object. Object have states and behaviors like cat has states like name, color and  cat has also behaviors like  wagging the tail, eating, jumping etc. A class forms template or blueprints for these states and behaviors because different cats have different behaviors and states.

Methods provide a way for encapsulation and accessing private class members with public methods and static fields are sometimes best alternative for global variable. We can use static field when it same for all and shared by all objects of that class and it can save memory because we do not have to initialize it for each object

8 0
3 years ago
Ann wants to save her presentation so she can work on it later. Which device on her computer can store this data long term?
RUDIKE [14]
I would say that the best option would be a multimedia card.
4 0
3 years ago
Write common ICT tools​
Naddika [18.5K]
  • computers
  • laptops
  • printers
  • scanners
  • software programs
  • data projectors
  • and interactive teaching box.

4 0
2 years ago
Other questions:
  • In the two-level directory, if a user refers to a particular file then__________________ Select one: a. only his/her own UFD (us
    7·1 answer
  • Consider the following C code fragment:
    10·1 answer
  • What is anatomy of software house?
    10·1 answer
  • Drag each label to the correct image.
    9·2 answers
  • How does recorded audio stay on an audio tape
    12·1 answer
  • We cannot imagine a life without the Internet. Imagine that you had to live without being connected to the Internet. Discuss the
    9·1 answer
  • Which is the OS that can be obtained for free or at a much lower price than other major operating systems?
    15·2 answers
  • Based on the following quote from Leonardo Da Vinci, what would be his definition of a fine artist? “Principles for the Developm
    11·2 answers
  • __________ implements a security policy that specifies who or what may have access to each specific system resource and the type
    8·1 answer
  • Which of the following tells the computer hardware what to do? A Information B) Software Procedures D People
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!