John works as an associate at a construction company. His job is to draft contracts for suppliers. Before he prints the contract, he sends it to his manager so that he can suggest any required changes. Which feature should John’s manager use to make the suggestions?
A.
Spell Check
B.
Track Changes
C.
Comments
D.
Edit

Answers

Answer 1

Answer: D

Hope that helped :)


Related Questions

Which term refers to actions that you would perform on a computer to revive it if it functions in an unexpected manner?

Answers

Answer:

I think that it is just rebooting

How do you calculate the file size of a text file?

Answers

Answer:

It is calculated by multiplying the surface area of a document (height x width) to be scanned by the bit depth and the dpi2. Because image file size is represented in bytes, which are made up of 8 bits, divide this figure by 8.

What devices do not need device drivers to be manually installed, and start to function as soon as they are connected to a computer?.

Answers

Plug-and-play devices are electronic devices that do not require any device driver to be manually installed on the host device (computer) and as such they start functioning immediately they are connected to the host device (computer).

Plug-and-play (PnP) can be defined as a technology that is designed and developed to allow an operating system (OS) of a computer to automatically detect and configure a peripheral (input and output device) as soon as they are connected to the computer.

On a related note, a plug-and-play device is an electronic device that do not require any device driver to be manually installed on the host device (computer) and as such it start to function immediately it is connected to the host device (computer).

In Computers and Technology, some examples of a plug-and-play device include the following:

External hard-driveComputer monitorKeyboardWeb-camMouse

Find more information: https://brainly.com/question/17402566

How many binary digits are in 10^100.

Answers

Answer:

333 binary digits.

Explanation:

What is a recent innovation in edge computing enhanced by 5G?.

Answers

A recent innovation in edge computing enhanced by 5G is placing computing resources physically inside the network infrastructure.

5G is the fifth generation of mobile communications operating on the basis of telecommunication standards, following the existing 4G.

5G technologies must provide higher bandwidth than 4G technologies, which will ensure greater availability of mobile broadband, as well as the use of device-to-device modes (direct connection between subscribers).

It also allows ultra-reliable large-scale systems communication between devices, as well as less latency, higher speed, and less battery power consumption than 4G equipment.

Learn more about computers in https://brainly.com/question/24836371

What are web protocols.

Answers

Answer:

Web protocols are a set of standards used to exchange information. It ensures that code can be modular and portable.

Answer:

The standard network protocol of the Internet, TCP/IP, stands for Transmission Control Protocol/Internet Protocol. The Internet Protocol part of the standard refers to the addressing of data message packets. Additional protocols that operate within the TCP/IP framework include UDP, HTTP and FTP. Each has different functions and purposes that ultimately work together to provide assorted capabilities through what's currently known as the World Wide Web.

Explanation:     i hope this helps

In any and every instance when the Federal Government provides recovery support, all six Recovery Support Functions will be activated. A. TRUE

Answers

Answer:

what?

Explanation:

what are the questions lol

alannah just purchased a smart lock for her front door. how can she connect her lock to the internet so she can control the lock when she’s away from home?

Answers

Answer: cellular connection

She can connect her lock to the internet so she can control the lock when she’s away from home by Bluetooth connection. The correct option is D.

What is a Bluetooth connection?

Bluetooth technology enables devices to communicate with one another without the use of cables or wires.

Bluetooth operates on a short-range radio frequency, and any device equipped with the technology can communicate as long as it is within the required distance.

Some devices can be connected to your phone via Bluetooth without the use of a cord.

After the first time you pair a Bluetooth device, your devices may pair automatically. If your phone is connected to something via Bluetooth, a Bluetooth icon will appear at the top of the screen.

Alannah can connect her lock to the internet and control it via Bluetooth while she is away from home.

Thus, the correct option is D.

For more details regarding Bluetooth connection, visit:

https://brainly.com/question/28258590

#SPJ2

Your question seems incomplete, the missing options are:

A. network cable

B. cellular connection

C. power cable

D. Bluetooth connection

Create an application that prompts the user for a number and then displays the numbers 1 through the number entered, each on a separate line. Below the numbers, the sum is displayed.

Answers

Answer:

In Python:

start = num(input("Enter a number: "))

sum = 0

for x in range(1, start+1):

sum += x

print (x)

print ("Final Sum: " + sum)

Answer:

import java.util.Scanner;

public class NumberSum {

public static void main(String[] args) {

// TODO Auto-generated method stub

int num, sum=0,num1=0;

Scanner input=new Scanner(System.in);

 

System.out.println("Enter a number");

num=input.nextInt();

input.close();

 

do{

System.out.println(num1);

num1+=1;

sum+=num1;

}while(num1<=num);

System.out.println(sum);

}

}

What is the difference between the dom api and the html dom api.

Answers

The DOM-core is the object model that is common for all XML documents (including HTML) with elements and attributes. The HTML-DOM is an extension of the core DOM with more specific interfaces for the various HTML elements.

EDI, ________, smart cards, and digital certificates are designed to support safe and secure online transactions.

Answers

Electronic data interchange (EDI), e-cash, smart cards, and digital certificates are all designed and developed to protect and support safe and secure transactions over the Internet (web).

In Business management, e-commerce can be defined as a business model which involves the buying and selling of goods (products) over the Internet (web), as well as the use of an online medium for payment.

Generally, it is necessary that adequate measures are put in place to protect and support safe and secure transactions over the Internet (web), so as to prevent the unauthorized use of a customer's confidential information such as password.

In Cybersecurity, some of the frameworks and technologies designed to provide safe and secure transactions over the Internet (web) include:

Electronic data interchange (EDI).e-cash. Smart cards.Digital certificates.

Read more: https://brainly.com/question/24112967

When you begin designing a program, you work from a ____, a description of what your program should do.

Answers

Answer:

This is usually called a brief (you will also hear this in the design industry, as well as other places)

How to remove link color and underline in html.

Answers

Answer:

To remove the underline from all hyperlinks on a page, follow these steps:

Open the page that you want to modify.

Click the Codetab.

Put the following HTML code before the <BODY> tag: <STYLE>A {text-decoration: none;} </STYLE>

Click the Designtab. Your hyperlinks no longer contain underlines.

Which development model emphasizes small revisions that enhance the code and expand the functionality until the entire program is built

Answers

Answer:

Iterative

Explanation:

is the model that emphasizes small revisions, unlike waterfall which is in a linear sequential flow.

If you used D*n as the criterion in a Short Text field called FirstName, what would appear in that field in the query results

Answers

When querying a list or table, the use of wildcard symbols maybe used to optimize the search result. The words D*n will return First names which starts with D and ends with n.

The (*) denotes that the search returns any values or alphabets inbetween D and n.

Names such as Dean, Don, Drezn and other rated names would be included in the returned query.

Therefore, the returned query would include names starting with the letter D and ends with the letter n.

Learn more : https://brainly.com/question/25586700

How to get response from post request angular.

Answers

Answer:

I am trying to get full response from a POST request. I have read how to get full response for a get request mentioned at the official site of angular. Angular http

What it says is to add { observe: 'response' }. But it would work for a get request and not for post request. post request accepts 2-3 arguments, so I cannot send this as the 4th argument. Please have a look at my code and let me know what I am doing wrong.

Explanation:

const httpOptions: { headers; observe; } = {

 headers: new HttpHeaders({

   'Content-Type':  'application/json'

 }),

 observe: 'response'

};

return this.http.post('http://localhost:3000/api/Users/login', data, httpOptions) ..

a write the result P*=++j where j is 24

Answers

Answer:

ang hrap nmn nyan

Explanation:

poede po

RDP connection from outside the network to a server inside the network. Which network device will a network administrator MOST likely configure to allow this connection? Hub Switch Firewall

Answers

Answer:

Firewall

Explanation:

The firewall might block the Remote Desktop Protocol (RDP) connection. This is because hackers could use open connections to brute force passwords or control an infected computer. The firewall ensures that only authorised connections occur.

The ______is the first part of a packet that contains the source and destination addresses. Select your answer, then click Done.

Answers

The first part of a data packet that comprises the source and destination addresses of a network is called a: header.

In Computer networking, the transmission control protocol/Internet protocol (TCP/IP) model refers to a standard networking protocol that allows network devices and host computers to interconnect and communicate with one another over a network, especially through the transmission of data packets and an Internet protocol (IP) address.

Generally, an IP address is typically designed and developed to hold information about data packets. Thus, a header is the information at the beginning of a data packet that comprises the source and destination addresses of a network.

In conclusion, a header is the first part of a data packet that comprises the source and destination addresses of a network.

Read more on header here: https://brainly.com/question/20629962

Which action must take place inside a procedure to reserve space on the stack for two doubleword local variables

Answers


after MOV EBP,ESP, subtract 8 from the stack pointer (ESP)

Select the correct answer.
Which option would you use to insert two line breaks in your document?
A.<2br>
B.

C.


D.

Answers

Answer:

yes, I agree.

Explanation: ,

Beyond restoring normal operations and data, what else should be done during the recovery phase?.

Answers

Based on troubleshooting management, beyond restoring normal operations and data, one should correct the underlying root cause during the recovery phase.

The need for correcting the underlying root cause.

During the restoration of normal operations and data, it is essential to correct the root cause of the problem.

By correcting the root cause of the operational problem, will limit the chance of the problem recurring.

Also, correcting the root cause of the problem will make the operations free completely of any possible malicious issue.

Hence, in this case, it is concluded that the correct answer is "correct the underlying root cause during the recovery phase."

Learn more about Restoration of operation here: https://brainly.com/question/6983264

I am malala how one girl stood up for education and changed the world pdf.

Answers

Answer:

what?

Explanation:

Four types of firewalls are: Packet filtering, stateful inspection, circuit level proxy and _________ .

Answers

Answer:

oxigen

Explanation:

The FAT method ______________.

a. keeps information about the block where bit vector is stored.

b. employs space maps to manage information about free blocks.

c. does not store information about free blocks.

d. incorporates free-block accounting into the allocation data structure.

Answers

The FAT method incorporates free-block accounting into the allocation data structure.

The File Allocation Table (FAT) method is a file system designed to store file information in a designated entry format. The operating system makes use of it to manage files on hard drives and other computer devices.

It usually comprises an entry for each block. As such, it is indexed via the block number. This helps to locate files faster based on the address of the given number of the free blocks as opposed to using the traditional grouping method.

Learn more about the File Allocation Table (FAT) method here:

https://brainly.com/question/4671431

we are unable to process your request at this time. if you continue to receive this error, please contact cardholder services by calling the number on the back of your card.

Answers

Answer:

is this a sim chip card replacement card for Electronics ?

Explanation:

i will give brainliest to the best answer. what is a good screen recorder

Answers

Answer:

If your on windows there is an x-box screen recorder installed on it. thats a new windows 11 update. If not, i used to use x-split broadcaster

Explanation:

If your on windows there is an x-box screen recorder installed on it. thats a new windows 11 update. If not, i used to use x-split broadcaster

mark me Brainliest

_____ is a privacy issue relating to the responsibility of those who collect data must ensure that the data is correct.

Answers

Answer:

Virtual private network

what programming language supports relational databases?

Answers

A programming language that supports relational databases is SQL (Structured Query Language)

Structured Query Language (SQL), is the principal method for communicating with Relational Databases.

A relational database is a group of data elements that are linked together by predefined connections. These elements are laid up in the form of a series of tables containing columns and rows.

Tables are utilized for storing data about the items that will be displayed in the database. A column in a database contains a specific type of data, whereas a field records the actual value of an attribute. The table's rows indicate a collection of linked values for a single item or entity.

Each entry in a database can be assigned a unique identity known as a primary key, and rows from other tables can be linked together via foreign keys. This data may be accessible in a variety of ways without having to reorganize the database tables itself.

Learn more about Relational Databases here:

https://brainly.com/question/8457395?referrer=searchResults

What is an IF statement used for?

Answers

The IF statement is a decision-making statement that guides a program to make decisions based on specified criteria. The IF statement executes one set of code if a specified condition is met (TRUE) or another set of code evaluates to FALSE.

Other Questions
Emma has addressed seven invitations to herbirthday party. This is one more than half of theinvitations that she intends to send. How manyinvitations does she intend to send? how have astronomers interpreted the unexpectedly fast rotation of galaxies Which researcher theorized that hypnosis comes about as a form of roleplay between hypnotist and subject? A. Ernest Hilgard B. Theodore Sarbin C. Theodore Barber D. Milton Erickson Please select the best answer from the choices provided A B C D It is estimated that ________% of children in the United States are being treated for ADHD with stimulant medications. Write the linear equation that gives the rule for this table. x f(x) 1 47 2 45 3 43 4 41 Chapter 9 Pricing, Costing, and Growth.Its 10 questions - multiple choice and thank you !I will give you brainliest if you answer all 10 (: What are the differences between the sat and act. YES I WILL MARK BRAINLIST:DSarah is going to the food truck with her friends. Hot dogs cost $2 and drinks cost $3. She has a total of $24 that she can spend. The equation 2x+3y=24 represents this scenario. Determine the amount of hotdogs that can be purchased if Sarah orders 4 drinks.Question 4 options:4 hotdogs7 hotdogs6 hotdogs5 hotdogs Learning Task 3: Compose clear and coherent sentences using the given modals and their functions below. Write your sentences in your notebook Modals Function Sentences 1. shall regulation 2. must strong obligation 3. can ability 4. may possibility 5. should advice how would you describe the religion of Hinduism to someone who follows western religions? find the square root of each by division method: a) 225 b) 961 c) 3969 d) 10404If you can give the correct answer first, I'll mark the brainliest. 4.16 11y-3-2-10slope: ________ are often dissatisfied individuals who cannot bring about internal change and, out of a sense of commitment or frustration, take their concerns to external constituencies. what are the 5 principles of fitness How do I know which region to shade for this inequalityy 2x + -4? What does "for example" tell readers about the sentence it introduces?1. that they're about to be introduced to a new idea2. that it's a sentence that will show them a similarity3. that it's sentence will show them a difference4. that they're about to hear an example of the idea in the previous sentence Which function has the smallest y-intercept value?A44h(x)2.X- 22.4+24OB.(x) == 2 + 10A linear function, f, with an x-intercept of 3 and a y-Intercept of 6.OC.OD.1234g(x)1-4-9-14 Read the sentence from "An Alternate Solution to Shoreline Rapid Transit. Snyder said his staff is presently drawing up a report to present to the Shoreline Rapid Transit for further review. Which definition of the phrase to present is most similar to the way it is used in the sentence above? O to present something, often humorously O to award something in a ceremony O to hand something over officiallyO to show or display something an airplane of mass 50 tonnes is flying at a speed of 5 km\s at a height of 50 km above the ground. what is the total energy it has on reaching the ground . Why are animals kept in a zoo? Are they safe? Is it good or bad? Why?