The Check Spelling command is found under the ________ menu.
Question 1 options:

1)

View

2)

Edit

3)

Layer

4)

File

Answers

Answer 1

Answer: 2

Explanation:


Related Questions

Which of the following uses an augmented assignment operator to multiply number by 5?

• number = 5;
• number = number * 5;
• number *= 5;
• number += 5

Answers

The option that uses an augmented assignment operator to multiply number by 5 is option  b: number = number * 5;

What is the Multiplication  about?

Multiplication and Assignment is one that is often denoted by (*=): This operator is known to be one that uses both the functionality of multiplication as well as the assignment.  

A statement where an operator takes a variable as one of its inputs and then assigns the result back to the same variable is typically replaced by an augmented assignment. x += 1,

Hence: a = a * b will be written as a *= b

Therefore, The option that uses an augmented assignment operator to multiply number by 5 is option  b: number = number * 5;

Learn more about assignment operator  from

https://brainly.com/question/14308529
#SPJ1

Mary is writing an article about the animal kingdom. She wants to place an image below the text. Which menu should Mary choose for this purpose?

Mary needs to choose the ___ menu in order to place the text in a desired fashion around the image.

the answer is insert

Answers

Answer:

After typing the whole text content like the way she wishes, she needs to click on the insert option. Insert option will show a list of options to pick and there she needs to click Picture option to insert the right image below the text. So "Insert" menu is the right answer.

Explanation:

Write a program that reads a list of words. Then, the program outputs those words and their frequencies. The input begins with an integer indicating the number of words that follow. Assume that the list will always contain less than 20 words.

Ex: If the input is:

5 hey hi Mark hi mark
the output is:

hey 1
hi 2
Mark 1
hi 2
mark 1
Hint: Use two arrays, one for the strings, another for the frequencies.

Your program must define and call a method:
public static int getFrequencyOfWord(String[] wordsList, int listSize, String currWord)

Note: This is a lab from a previous chapter that now requires the use of a method.

Answers

The program that reads a list of words will be:

#include <stdio.h>

#include <string.h>

int main() {

   int frequency, num_words, i, j;

   char words[20][10];

   scanf("%d", &num_words);

   for (i = 0; i < num_words; i++) {

       scanf("%s", words[i]);

   }

   for (i = 0; i < num_words; i++) {

       frequency = 0;

       for (j = 0; j < num_words; j++) {

           if (strcmp(words[i], words[j]) == 0) {

               ++frequency;

           }

       }

       printf("%s - %d\n", words[i], frequency);

   }

   return 0;

}

What is a program?

It should be noted that a series of instructions written in a programming language for a computer to follow is referred to as a computer program.

The source code of a computer program is the version that can be read by humans. In this case, the program that reads a list of words is illustrated above.

Learn more about program on:

https://brainly.com/question/27359435

#SPJ1

Short notes on Encryption and Decryption?​

Answers

Answer:

Explanation:

Encryption is the process by which a readable message is converted to an unreadable form to prevent unauthorized parties from reading it.

Decryption is the process of converting an encrypted message back to its original (readable) format. The original message is called the plaintext message.

When is a worker likely to be injured

Answers

Answer:

when he isn't paying attention or drops

Which of the following fields use computers?
1. Computer Science
II. Medicine
III. Video Gaming
IV. Automotive (Cars)

I
I, III
I, II, III
I, II, III, IV

Answers

1 2 3 use them mainly.

Answer:

The answer is B. l, lll

Explanation:

please correct me if I'm wrong

SUPPOSE A PIECE OF CODE FROM AN APPLICATION IS GIVEN TO YOU, AND YOU RECOGNIZE THAT IT IS TRYING TO ORDER THE DATA BY SWAPPING ADJACENT DATA POINTS ALL THE WAY THROUGH THE LIST. WHAT ALGORITHM DOES THIS REPRESENT?
A: QUICK SORT
B: BINARY SEARCH
C: MERGE SORT
D: BUBBLE SORT

Answers

Based on the above, the The algorithm represent what we call the Bubble Sort.

What is bubble sort program?

The simple sorting algorithm bubble sort in C checks and switches elements if they are not in the desired order. It determines which of two nearby elements is greater or less by comparing them, then shifts the elements based on the condition until the element is located at its final location.

Therefore, Based on the above, the The algorithm represent what we call the Bubble Sort.

Learn more about Bubble Sort from

https://brainly.com/question/13161938
#SPJ1

Question 3: Which of the following is NOT one of the basic functions of malware?
O Gathering personal information about you
O Launching a denial of service attack
O Aggressive advertising
O Tracking your surfing habits

Answers

Answer choice 4 is not one of the basic functions of malware

What are considered best practices to reduce our reliance on EUCs?

Answers

The best practices to reduce our reliance on EUCs are:

Access Control Change Control.Input Control. Security in the archiving and backups folders, etc.

What qualifies as an EUC?

End-user computing (EUC) is known to be a term used to describe computer platforms and systems that assist non-programmers in the creation of applications.

However, EUC and the linked virtual desktop infrastructure (VDI), which tends to runs desktop environments on a central server, are said to be much more than that.

Therefore, The best practices to reduce our reliance on EUCs are:

Access Control Change Control.Input Control. Security in the archiving and backups folders, etc.

Learn more about End user computing from

https://brainly.com/question/13176736
#SPJ1

in python
Write an if-else statement with multiple branches.
If year is 2101 or later, print "Distant future" (without quotes). Otherwise, if year is 2001 or greater, print "21st century". Otherwise, if year is 1901 or greater, print "20th century". Else (1900 or earlier), print "Long ago".

Sample output with input: 1776
Long ago

Answers

Answer:

year = 1776

if year >= 2101:

   print("Distant future")

elif year >= 2001:

   print("20th century")

else:

   print("Long ago")

   

Explanation:

Alternatively, if you wanted the user to assign a value to the "year" variable. You could replace year = 1776 with year = int(input("Enter a year: "))

Whst addresses do not change if you copy them to a different cell?

Answers

The type of addresses that do not change if you copy them to a different cell is Absolute references.

What are absolute references?

There are known to be two types of cell references which are: relative and absolute.

Note that Relative and absolute references can work differently if copied and filled to other cells. The Absolute references, is one that often remain constant, no matter where a person may have copied them to.

Therefore, The type of addresses that do not change if you copy them to a different cell is Absolute references.

Learn more about Absolute references from

https://brainly.com/question/11764922

#SPJ1

Describe a present-day computing environment that might use each of the memory allocation schemes (single user, fixed, dynamic, and relocatable dynamic) described in the chapter. Defend your answer by describing the advantages and disadvantages of the scheme in each case.

Answers

The single user, fixed, dynamic, and relocatable dynamic is further explained below.

How to illustrate the information?

1. Single user memory allocation scheme

The complete program is loaded into memory, and it allots as much contiguous space there as it requires. Programs or jobs are processed in this single user system in a sequential manner. The memory manager needs to put in the least amount of effort under this system. A register is used to hold the base address, while an accumulator measures the size of the program

Fixed partitions

The primary memory is divided into this fixed segment. Multiprogramming is possible. The partition's size doesn't change until the system is shut down, configured, or restarted. The memory size of the job, the appropriate job size, and the partition size must all be protected.

Dynamic partition

Only the amount of memory requested by each work is put into the memory, and the available memory is preserved in contiguous blocks.

Learn more about computer on:

https://brainly.com/question/24540334

#SPJ1

Which of the following is NOT an example of troubleshooting?
Contacting the manufacturer's customer support.
Making sure cables are connected properly.
O Purchasing a new device.
O Searching the Internet for a solution.

Answers

Answer:

O Purchasing a new device.

Explanation:

Why was the department of homeland security created ​

Answers

Answer: To stop terrorist

Explanation: After the attack on 9/11 the Department Homeland Security was created to stop terrorist. :)

A student used material that was copyrighted but without penalty. Although age is not a guarantee, at what age is most material in the public domain?
It must be ---- years old.
a 10
b 25
c 50
d 100

Answers

Answer:

c

Explanation:

Is it true that all office programs include the capability to incorporate feedback called online collaboration across the internet or a company network

Answers

It is true that all office programs include the capability to incorporate feedback called online collaboration across the internet or a company network.

What is online collaboration?

The process of connecting users digitally to communicate in an online space is known as online collaboration. A software system that allows team members to communicate using video, audio, and text is usually used to supplement online collaboration.

It is primarily used by businesses to improve communication and project efficiency.

All Office programs include the ability to incorporate feedback via the internet or a company network, which is known as online collaboration.

Thus, the given statement is true.

For more details regarding online collaboration, visit:

https://brainly.com/question/19191600

#SPJ1

Give an example of Parallel and Serial transmission and explain the process between the two.

Answers

Answer:

You can find it online at geeks to geeks

Explanation:

In Serial Transmission, 8 bits are transferred at a time having a start and stop bit. Parallel Transmission: In Parallel Transmission, many bits are flow together simultaneously from one computer to another computer. Parallel Transmission is faster than serial transmission to transmit the bits.

When following the user-centered design approach, what should a designer do after completing initial user research to better understand the user?
• Test the design solution with real people
• Determine who your user is
• Build on previous designs and make tweaks
• Determine the most important user problem to solve
which option is correct answer

Answers

Following the user-centered design approach, after completing initial user research to better understand the user they should go for determining who the user is. The correct option is B.

What is user-centered design approach?

Design is founded on a clear understanding of users, tasks, and environments; it is guided and refined by user-centered evaluation; and it addresses the entire user experience.

The iterative process involves users throughout the design and development process.

UCD is an iterative design process in which designers focus on the users and their needs throughout the design process.

UCD design teams use a variety of research and design techniques to involve users throughout the design process in order to create highly usable and accessible products for them.

Following the user-centered design approach, they should determine who the user is after conducting preliminary user research to better understand the user.

Thus, the correct option is B.

For more details regarding user-centered design approach, visit:

https://brainly.com/question/28379376

#SPJ1

Problem statements help designers propose a specific, measurable solution that addresses the user’s goals and pain points. Which of the following is a quality of a great problem statement?

Answers

A problem statement is clear description of the user's need that should be addressed.

What does a design problem statement mean?

The  problem statement is an accurate and succinct depiction of the issue at hand is referred to as a problem statement.

It serves as a useful scoping tool, focusing the team on the issue that needs investigation and eventual resolution. What has to be done in course of/during discovery and also that or what is outside of scope are made plain by a problem statement.

Therefore,  A problem statement is clear description of the user's need that should be addressed.

Learn more about problem statement from

https://brainly.com/question/13075121
#SPJ1

Fill in the blank: A problem statement is a(n) _____.

1
A problem that can be solved through
technological design has been identified. A
brief has been written. What is the next step
in the design process?
O Specification writing
O To conduct background research
O To identify barriers and constraints
The design of different potential solutions

Answers

The next step in the design process will be the design of different potential solutions. The correct option is D.

What is technological design?

Technological design is a distinct process with several distinguishing characteristics: it is purposeful, based on specific requirements, iterative, creative, and systematic.

A good technical design is one that requires the least amount of effort and money while meeting your business requirements, particularly in terms of development speed and turn-around time, maintenance cost, deployment complexity, scalability, or security requirements.

A problem has been identified that can be solved through technological design. A synopsis has been written. The design of various potential solutions will be the next step in the design process.

Thus, the correct option is D.

For more details regarding technological design, visit:

https://brainly.com/question/26663360

#SPJ1

Correctly discuss the third generation Considering​

Answers

Answer:

Random-access memory...

In 25 words or fewer, explain how u can help maintain a productive work environment while on the job

Answers

I would ensure side attractions like gisting or surfing the internet while I am supposed to be working are eliminated while also personalizing my space.

What conflict control method are you exhibiting if you deal with people in a way that does not offend them?

Answers

Answer: A

Explanation:

Question 1 of 4
OSHA requires which of the following trenches to have a protective system installed?
Select the best option.
O
A trench 1 foot deep.
A trench 3 feet deep.
A trench 14 feet deep.

Answers

Answer:

These are all wrong. OSHA requires a trench to have a protective system starting at 5 feet.

Explanation:

OSHA's own rules state this, unless it is in stable rock. If it is under 5 feet, it isn't required and can be decided by someone qualified.

A trench 14 feet deep would definitely require a protective system, due to the the minimum being 5 feet.

define physical topology

Answers

Answer:

Physical topology refers to the interconnected structure of a local area network (LAN). The method employed to connect the physical devices on the network with the cables, and the type of cabling used, all constitute the physical topology.

In _____programs and data have the same form.

Answers

In array, programs and data have the same form.

Is the data type shared by arrays?

A succession of objects with successive numbers are stored in an array, which is a homogeneous data structure (all components have the same data type). The items are allocated in contiguous memory.

By utilizing its number, each object in the array can be accessed (i.e., index). You specify an array's size when you declare it.

When the array is declared as an Object, it is possible to create an array containing items of several data types. as of System. An item in an array of objects can have a reference to any other type of object because objects are the basic class for all other types. A data structure called an array can hold a fixed-size group of identically data-typed elements

Therefore, based on the above, In array, programs and data have the same form.

Learn more about array from

https://brainly.com/question/26104158

#SPJ1

Explain security interdependence among components in a computing environment.Give three examples demonstrating security interdependence in an information system.

Answers

When a catastrophic risk faced by one firm is partially determined by the behavior of other firms, and when this behavior influences the incentives of the first firm to limit its exposure to the risk, security issues become interdependent.

What is security independence in a computing environment?

Because security is a component that requires the integration of several system parts, such as from the authentication and authorization segment where users are authenticated and granted access, and security is established using the encrypted part of the program or system, security interdependence can be seen in the various components of the information system or the computing environment. Security is dependent on the system as a whole, including the link layer security, transport layer security, any encryption methods utilized, and secure data transfer.

The use of link layer security, transport layer security, and encryption techniques are three examples of how security is interdependent.

To get more information about Security Independence :

https://brainly.com/question/28149669

#SPJ1

What is wrong with this text message:
USPS: Tracking Number:
US3896901185421. Dear
customer we have problems with
your shipping address, please
update your information. Check
Here: https://usps.nom.co/vf9

Answers

The Link is saying that there was an error and that you had a faulty link that was not secure.

The Connection is informing you that there was a mistake and that your link was broken and insecure.

What are tracking numbers?

Once you receive your tracking number, tracking your package is simple. The USPS Tracking page only requires the tracking number to be entered.

Along with additional tracking details, such as delivery and/or attempted delivery information, you'll receive the item's current status. The majority of domestic services, like USPS Priority Mail, have tracking numbers that begin with a series of numbers, like 9400.

However, the USPS's overseas tracking numbers start with a series of letters.

Therefore, the Connection is informing you that there was a mistake and that your link was broken and insecure.

To learn more about tracking numbers, refer to the link:

https://brainly.com/question/27640701

#SPJ5

Given the 4 ways companies try to manage their impact on the environment, write an essay (no more than 200 words) describing how a car manufacturer can improve their impact on the environment (come up with improvement initiatives on all 4 categories).

Answers

The 4 ways companies try to manage their impact on the environment are:

Do Measure as well as examine Greenhouse Gas Emissions.Lower Energy Consumption.Provide Renewable Energies. Lower  Waste And Fight Obsolescence·How can businesses lessen their negative effects on the environment?

This can be done through the Use of recycle. Businesses may address and lessen their influence on the environment by recycling. Whether it's recycling paper in an office or glass and food waste in the hospitality industry, it can be a simple action to incorporate into routine operational culture.

Note that companies can mae use of  less gasoline, buy as well as  keep fuel-efficient automobiles, take in fuel-efficient driving practices, taking public transit and carpooling, recycling used materials, and  others.

Therefore, The 4 ways companies try to manage their impact on the environment are:

Do Measure as well as examine Greenhouse Gas Emissions.Lower Energy Consumption.Provide Renewable Energies. Lower  Waste And Fight Obsolescence·

Learn more about Greenhouse Gas Emissions from

https://brainly.com/question/9912932
#SPJ1

Group dynamics differ according to the size of the group.
True
False

Answers

Uhm this one is confusing in group dynamics we need peoples too but it really doesn’t matter in big size even if there is just two people we can interact anyways I will go for true
Other Questions
1=1cm x 1\2 cm x 2cm a car is travelling to the right with a speed of 42 m/s when the driver slams on the brakes. the car skids for 4 s with constant acceleration before it comes to a stop. what distance does the car travel as it skids to a stop? a fence post is 51.0 m from where you are standing, in a direction 35.0 north of east. a second fence post is due south from you. a fence post is 51.0 m from where you are standing, in a direction 35.0 north of east. a second fence post is due south from you. The FitnessGram PACER Test is a multistage aerobic capacity test that progressively gets more difficult as it continues.The test is used to measure a student's aerobic capacity as part of the FitnessGram assessment. Students run back and forth as many times as they can, each lap signaled by a beep sound. The test get progressively faster as it continues until the student reaches their max lap score.The PACER Test score is combined in the FitnessGram software with scores for muscular strength, endurance, flexibility and body composition to determine whether a student is in the Healthy Fitness Zone or the Needs Improvement Zone. alice is an employee of valley company. alice properly completed her form 1040 tax return and received a refund from the irs of $1,244. alice had income tax withholdings during the year of $4,782. alice's tax liability for the year was: Fully answer the following question: discuss the causes of the english civil war in regards to the concept of divine right, parliamentary law, ship money, the queen and religion. Ceteris paribus means:______.a. other things constant. b. let the buyer beware. c. making all the necessary changes. d. for certain parameters. -4 + 8[tex]\frac{3} {8}\frac{6} {7}[/tex] what makes us who we are? Is it our mind, soul or body? Or perhaps a combination of all three?Pls answer A drop of water can contain an entire ecosystem.True False+11 points Let a = any rational number. Is the absolute difference if a is a positive or a negative number? Explain All of the following might be an indication of social media addiction EXCEPT in the winner-take-all system, the candidate that gets the most votes wins. one must get a majority of votes cast to win. votes are allocated on a proportional basis. only parties receiving more than five percent of the vote are allocated seats. a party must have competed in a previous election to be placed on the ballot. yo can somebody help me with this please i really need a good grade ill give crown to Hurry, please i will give crownin a short-answer response, thoroughly describe what free-body diagrams are used for and what the free-body diagram is telling us about the directions of the forces. Make sure to include which direction the object will move and give an example of what that object could be. (examples: box, soccer ball, rope in a tug-of-war, etc.) there are 22 students in a 6th grade class. for the class field trip, they went to the local museum. admission to the museum was $7 a person. after going to the museum, they went to the art festival. admission to the art festival was $4 a person. each student paid $12 for the field trip and the bus. what is the total amount of money the teacher collected from the students? a.$12 b.$31 c.$242 d.$264 Question 8A: Mr. Sowers wants to purchase expo markers for his classroom. He has a budget of $35. A four pack of markers costs $5.49, including tax. Write and solve an inequality, using x for the variable, to solve for the number of packs of markers Mr. Sowers can purchase.Question 8B: Describe the graph of the solution for question 8A.A. Place an open circle on 6 with shading to the leftB. Place a closed circle on 6 with shading to the leftC. Place an open circle on 6 with shading to the rightD. Place a closed circle on 6 with shading to the right The speed of a projectile when it reaches its maximum height is one-half its speed when it is at half its maximum height. What is the initial projection angle of the projectile?. ace co. settled litigation on february 1, year 2, for an event that occurred during year 1. an estimated liability was determined as of december 31, year 1. this estimate was significantly less than the final settlement. the transaction is considered to be material. the financial statements for year-end year 1 have not been issued. how should the settlement be reported in ace's year-end year 1 financial statements? What would be different about the problem if we change the equation to Y equals 5X squared or what about