1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
allochka39001 [22]
2 years ago
5

HELP URGENT

Computers and Technology
1 answer:
arsen [322]2 years ago
5 0

Answer:

D. It is a program that checks for grammatical errors.

You might be interested in
What does expected initializer before ". " token mean?
densk [106]

;l p lm k                  nnnnnnnnnnnnnnnnnnnnnnnnnnnnnn

4 0
3 years ago
Decribe the components of an Microsoft<br>Windows desktop<br>​
damaskus [11]

Explanation:

the main component of Windows when you start your computer are the desktop, my computer, recycle bin , start button, Taskbar and shortcuts to application after opening an application you will also have a Windows with an active application which will appear in your desktop and taskbar.

3 0
3 years ago
Which audio file type was created specifically for use on the Internet?
faltersainse [42]
I believe MP3 like 89% sure
6 0
3 years ago
Read 2 more answers
What log file contains information and error messages regarding network access generated by daemons such as ssd and xinetd?
ehidna [41]

Answer:

The correct answer to the following question will be "Secure".

Explanation:

This file includes information about the rights of verification and authorization.

  • It will be used primarily for monitoring the use of authorization schemes.
  • It holds all communications related to safety like faults in encryption.
  • This also monitors sshd logins, logins of SSH, as well as other system security resources daemon-logged failures.

So, it's the right answer.

3 0
2 years ago
Why would you want to hyperlink objects into your own Google Slides presentation? (Select all that apply.) Select All Correct Re
asambeis [7]

The correct answers are A.  For extending the learning experience for students. C. So students can use the Slides for review and can go to additional resources outside of the presentation. D. To make the presentation more graphically appealing

Explanation:

The use of hyperlink objects in presentations means objects such as images, texts, or icons are associated with links or websites students can easily access by clicking on the specific image or element. This might be used in educational contexts to allow students to have a complete learning experience by providing alternative and external sources outside the presentation. For example, if the topic is space hyperlinks to NASA website can be included. This means, hyperlink objects extend learning experiences and provide additional resources (Option A and D).

Besides this, this resource can make a presentation more appealing as links to images, videos, and other visually interesting resources can be included (Option D). However, it also breaks the linearity of the presentation as students will need to move to other websites as they go through the presentation.

5 0
2 years ago
Other questions:
  • Jabari is writing a program which prompts a user for a value with a decimal. Which function should he use? float() int() print()
    9·2 answers
  • In 3 to 5 sentences, describe whether or not files should be deleted from your computer. Explain you answer.
    14·2 answers
  • Calvin needs to design a simple yet professional interface for his users. Which option should he implement?
    9·2 answers
  • A network administrator determines who may access network resources by assigning users
    10·1 answer
  • Write a function named findmax()that finds and displays the maximum values in a two dimensional array of integers. The array sho
    13·1 answer
  • . What process skill would a scientist use to find the length of a line
    5·1 answer
  • According to programming best practices, how should you handle code that needs to be repeated several times in a program?
    6·1 answer
  • Anyone who do bug bounty hunt ?​
    10·1 answer
  • I WILL MARK IT BRAINLIEST FOR SURE ☺️❤️
    13·1 answer
  • What is the name for the base-2 system used by computers to represent
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!