Why did the spelling and grammar checkers in Word miss the errors highlighted in yellow?

Please help me

Answers

Answer 1

Answer:

Spelling and grammar missed them because the highlighted errors are actually words that are not in the right place and when you misspelled them, it turned into a word in the incorrect place.


Related Questions

how to calculate 3 X (50 + 40) ÷ 5 on excel 2016

Answers

Answer:

I think this might help, don't know much of this

Explanation:

How do you calculate 3.5 increase in Excel?

How To Increase a Number By a Percentage. If want to calculate a percentage increase in Excel (i.e. increase a number by a specified percentage), this can be done by simply multiply the number by 1 + the percentage increase. - which gives the result 60.

Explanation:

I am not sure what your problem is.

you don't know how to enter a formula into an Excel cell ? or you don't know how to combine the content of cells into one result in another cell ? or ... ?

but just answering literally this one-line-problem-definition

you click into an empty cell and type

=3*(50+40)/5

and press return.

and the cell will show you the result. 54

Where do you find the option to Restore a Davinci Resolve Archive project file?

Answers

With your project fully archived, you need to restore it to use in Resolve. Back in the project window, right-click anywhere, and hit “restore.” Navigate to the archived project folder, and select open. Resolve will then import the project, bins, and media exactly as you left them prior to archiving

How can you legally use the search engine

Answers

To perform a search, you'll need to navigate to a search engine in your web browser, type one or more keywords, also known as search terms, then press Enter on your keyboard.

After you run a search, you'll see a list of relevant websites that match your search terms. These are commonly known as search results. If you see a site that looks interesting, you can click a link to open it. If the site doesn't have what you need, you can simply return to the results page to look for more options.

Most browsers also allow you to perform a web search directly from your address bar, although some have a separate search bar next to the address bar. Simply type your search terms and press Enter to run the search.

Hope my answer helped u :)

Question 3 A benefit of using online tools is that: O you have more privacy because the information is stored locally on your computer. they are accessible anywhere you have the internet. it is the only way to utilize essential business software. everything is stored in the same place. Question 4​

Answers

Answer:

False, it doesn't mean that if a application is stored on a device, it can't steal any data. Take cloud service for example it is not locally stored on your computer it is stored on the huge amount of databases, meaning that the service provider could steal the files or delete them without consent.

PROCEDURE: Therapeutic infusion of saline solution with 5% dextrose IV, 500 ml for dehydration, lasting 48 minutes. what is the right cpt code and hcpcscode?

Answers

Answer:

no

Explanation:

yes becouce not arance the name of fegeur spech

When must an Assured Equipment Grounding Conductor Program (AEGCP) be in place?
Select the best option.

At every worksite


Only when GFCIs are in place


Only when working around power lines


When an employer does not use GFCIs

Answers

Answer:

Only when working around power lines

Explanation:

Assured Equipment Grounding Conductor Program (AEGCP) is applicable mainly in sites dealing with power. Therefore, the most appropriate worksite to have Assured Equipment Grounding Conductor Program is when  working around power lines.

Answer:

When an employer does not use GFCIs

Explanation:

a printer gives hard output whereas a screen gives_ output​

Answers

Answer:

Explanation:

Easy,soft copy output as the output given by a screen only can be seen but can't be touched

Identify the commands for the following list operations.

Check that there are no items in a list
Insert 10, 50, 30, 40, and 20 at the end of the list
Arrange the items in ascending order

a. IsEmpty(list)
Prepend(list, 10)
Prepend(list, 50)
Prepend(list, 30)
Prepend(list, 40)
Prepend(list, 20)
Sort(list)

b. Search(list)
Append(list, 10)
Append(list, 50)
Append(list, 30)
Append(list, 40)
Append(list, 20)
Sort(list)

c. IsEmpty(list)
Append(list, 10)
Append(list, 50)
Append(list, 30)
Append(list, 40)
Append(list, 20)
GetLength(list)

d. IsEmpty(list)
Append(list, 10)
Append(list, 50)
Append(list, 30)
Append(list, 40)
Append(list, 20)
Sort(list)

Answers

Answer:

D

Explanation:

the answer is D because it does exactly what the problem says.

Several scholarship opportunities exist to assist students in pursuing STEM-related degrees.

True
False

Answers

True true true and always true.
The answer is true!! Have a great day!

What is Smart Content Profits all about?

Answers

Answer:

Smart Content Profits is a ground-breaking app that builds WordPress sites on auto-pilot. Just add in a domain and let this system do the rest.

Answer: A friendly system that lets you build content sites very quickly.

Explanation:

To change the type of tab showing in the Tab Selector Box, which of the following should be done? Right-click on the Tab Selector Box Click on the Ruler Right-click on the Ruler Click on the Tab Selector Box

Answers

Literally, a tab selector presents to the user varieties of tab marker options.

To change the type of tab, you simply (d) Click on the Tab Selector Box

The tab selector is situated at the left of the ruler, and there are four basic types of tabs.

Left-alignedCenteredRight-alignedDecimal-aligned.

To change between these tabs, you simply click on the tab selector.

Hence, the correct option to change the type of tab is option (d)

Read more about tab at:

https://brainly.com/question/14459387

Where is the ‘Chart’ button in Powerpoint?

Answers

Answer:

The picture attached

To create a cell reference in another spreadsheet you must need to start with _______ sign.
a. = = b. & c. = d. $

Answers

Answer:

You need to start with c) =

Declare an eight by eight two-dimensional array of strings named chessboard.

Answers

Answer:SOLUTION:  

String [][] chessboard = new String [8][8];

Describe briefly three applications/systems that can be used to add digital signature to a document?

Answers

Answer:

Applications of Digital Signature

To send and receive encrypted emails, that are digitally signed and secured.

To carry out secure online transactions.

To identify participants of an online transaction.

Explanation:

What is the best Computer in the World?
Wrong answer will be reported!

Answers

Dell XPS Desktop Special Edition is the best Computer in the World

▪▪▪▪▪▪▪▪▪▪▪▪▪▪▪▪

Cutest Ghost

▪▪▪▪▪▪▪▪▪▪▪▪▪▪▪▪

demons I shall be your eternal nightmare

Answers

What does this mean??? Should I be scared right now? Just kidding I’m not scared. Hope you’re not trying to cause harm. Hope you have a positive day and happy Thanksgiving to you and your family

Jacob is a network technician who works for a publishing company. He is setting up a new hire's access permissions. The new hire, Latisha, is an editor. She needs access to books that have been accepted for publication but are in the review stage. Jacob gives her access to the network drive containing only books in review, but not access to administrative or human resources network drives. What principle is Jacob applying

Answers

If Jacob gives her access to the network drive containing only books in review, but not access to administrative or human resources network drives. The principle that Jacob is  applying is: The principle of least privilege

Principle of least privilege is a principle that help to protect confidential or sensitive information from unauthorized use.

Which means that a user is only authorized  or given the permission to  access least information or information  which the user only need to carryout their assignment or tasks.

Principle of least privilege is important as it help to minimize or limit the damages that can arise due to unauthorized usage.

Inconclusion  if Jacob gives her access to the network drive containing only books in review, but not access to administrative or human resources network drives. The principle that Jacob is  applying is: The principle of lease privilege.

Learn more here:

https://brainly.com/question/14132911

Manufactured computers and cell phones are part of which industry? Electronics Chemicals Machinery Metal products

Answers

Answer:

The correct answer is the electronic industry

Hope this helps

Answer:

Electronics

Explanation:

2) RMU divides students into house groups based on the month that they were born in.
born in May, June, July or August are put into Bridge House. All other students are
Students born in January, February, March or April are put into Ship house. Students
put into Anchor house.
Design a flowchart that will:
. Ask the user to enter a number (1 to 12) relating to their birth month
Decide which house they are in and print this out.
Keep a running total of how many students are in each house.
Repeat the above for 20 students.
When 20 students have entered their details, print out how many students are in
each house

Answers

describe your childhood

The roots of the quadratic equation ax² + bx + c = 0, a ≠ 0 are given by the following formula:

Quadratic Formula
In this formula, the term b² - 4ac is called the discriminant. If b² - 4ac = 0, then the equation has a single (repeated) root. If b² - 4ac > 0, the equation has two real roots. If b² - 4ac < 0, the equation has two complex roots.

Instructions
Write a program that prompts the user to input the value of:

a (the coefficient of x²)
b (the coefficient of x)
c (the constant term)
The program then outputs the type of roots of the equation.

Furthermore, if b² - 4ac ≥ 0, the program should output the roots of the quadratic equation.

(Hint: Use the function pow from the header file cmath to calculate the square root. Chapter 3 explains how the function pow is used.)

Format your output with a decimal precision of 2.

Answers

Hope it helps. Thanks.

PYTHON- Credit card numbers follow a standard system. For example, Visa, MasterCard, and Discover Card all
have 16 digits, and the first digit serves to indicate the card brand. All Visa cards start with a 4;
MasterCard cards always starts with a 5; and Discover cards start with a 6. Write out a program that
prompts for a credit card number and emits the name of the brand. If the card brand cannot be
determined, the program should output "Unknown Card"

Answers

Answer:

ccard = input("What is your credit card #: ")

if ccard[0] == 4:

   print("Visa")

elif ccard[0] == 5:

   print("MasterCard")

elif ccard[0] == 6:

   print("Discover")

else:

   print("Unknown Card")

What is the key benefit of the least privilege approach
to security?
o It results in task being completed quicker
o It minimises the level of compromise in the event of a security breech
O Ensures modular, reusable output

Answers

Answer:

2nd

Explanation:

it has a low security

List and Explain the programming Languages required to start working in Apple.

Answers

Answer:

JavaScript, Java, and C++ are obvious additions. Mastering these programming languages can help you land a secured job at Apple. If you pay attention to the popularity of programming language skills, Python is an immensely popular generalist programming language across all leading tech companies

How do you setup Synapse x? Please explain each step

Answers

1. You download the compressed file from the website

2. Create a new folder on your desktop, then copy the file location.

3. Right click on the compressed file that contains Synapse X

4. Select “Extract all,” then paste the file location of the folder you wish to keep it in, and click “Extract.”

5. Make sure Windows Real-time Protection is OFF before trying to run the .exe file, otherwise your OS will automatically delete the .exe file then you'll have to delete all the contents from your folder and restart from step 3.

You can find the Windows Real-time Protection option by going to the Windows search bar and typing "Virus and Threat Protection,"

then clicking on the "Manage Settings" button underneath the "Virus & threat protection" tab, then disabling Real-time Protection.

It will give you a prompt warning you that your PC could be open to threats, however as long as if you're not downloading shady things from shady sites, and you're not discoverable on your Wi-Fi network, you'll be fine without it.

Keep in mind, Real-time Protection automatically turns itself back on after a set amount of time of it being disabled. So you'll have to disable it every time you wish to use Synapse X.

6. Once you've done all of that, just follow the prompts that Synapse X gives you, give your whitelist code, log in, and you're set.

What type of data causes concern for institutions or business when collected, stored, and not secured properly?
Advertising information
Personal identifying Information
User interface information
Marketing information

Answers

Answer:

user interface information

Explanation:

This is because it exposes the infrastructure of the business or institution which includes the layout of plans and future perspective

The type of data that causes concern for institutions or business when collected, stored, and not secured properly is Personal identifying Information.

What is  Personal identifying Information?

Personal Identifiable Information (PII) is known to be any depiction of information that allows the identity of a person to whom the information is given to be reasonably taken by direct or indirect method.

Therefore, The type of data that causes concern for institutions or business when collected, stored, and not secured properly is Personal identifying Information as it can lead to issues and lawsuit if tampered with.

Learn more about Personal Information from

https://brainly.com/question/25228524

#SPJ6

measurement, analysis and iteration forms which stages of the strategy and planning process​

Answers

Answer:

science is what it is that science

Explanation:

A printer is considered to be in the category of
a. software
Selected:b. hardware
c. operational system
d. equipment

Answers

A printer is considered to be in the category of b. hardware.

What is hardware?

Computer hardware contains the physical characteristics of a computer, such as a case, central processing unit (CPU), random access memory (RAM), monitor, mouse, keyboard, computer data storage, pictures card, sound card, speakers, and motherboard.

Hardware directs to the physical components of a computer. Also directed to as the machinery or the equipment of the computer. Examples of hardware in a computer exist the keyboard, the monitor, the mouse, and the processing unit However, most of a computer's hardware cannot be caught; It's inside the computer case.

A printer exists as an external hardware output device that brings the electronic data stored on a computer or other device and develops a hard copy.

Hence, A printer is considered to be in the category of b. hardware.

To learn more about hardware refer to:

https://brainly.com/question/24370161

#SPJ2

I have problems in compiling this Java code:
class SumMatrix{
public static void main(String[] args){
matrixAdd({{1;2}; {5;6}}; {{8;7}; {3;4};});}
public static double[][] matrixAdd(double m1[][], double m2[][]){
int i,j;
double sum[][];
for (i=1;i<=2;i++){
for(j=1;j<=2;j++){
sum[i][j]=m1[i][j]+m2[i][j];
}}
for (i=1;i<=2;i++){
for(j=1;j<=2;j++)
return sum[i][j];
}
}
}
I get this errors:

Answers

Not my fault double sun you should restart your computer for it work

Create a set of functions that compute the mean, median, and mode of a set of
numbers. Section 5.4 - Example: Using a List to Find the Median of a Set of Numbers
provides a simple algorithm for calculating the median for a set of numbers. Each
Function should expect a list of numbers as an argument and return a single number
Each function should return O if the list is empty. Include a main function that tests
he three statistical functions with a given list. Do not use the statistics or math
nodules to create the functions. The functions must be created by you.

Answers

Refer to the attachment.

Language used=Python

Answer:

Create a set of functions that compute the mean, median, and mode of a set of

numbers. Section 5.4 - Example: Using a List to Find the Median of a Set of Numbers

provides a simple algorithm for calculating the median for a set of numbers. Each

Function should expect a list of numbers as an argument and return a single number

Each function should return O if the list is empty. Include a main function that tests

he three statistical functions with a given list. Do not use the statistics or math

nodules to create the functions. The functions must be created by you.

Other Questions
Name the three sources of sulphur in the Earth's crust 3. A seed company says that 4 out of every 5 of its seeds grow. If Natplanted 10 of the seeds, how many can he expects to grow?'O A. 6O B.7O C. 8O 0.9 Thank you for the beautiful stationary set! I cant wait to use it! A red food coloring recipe says, "Mix `4` tbsp raspberry juice with `3` tbsp strawberry juice and `2` tbsp water." Kiran wants to make `45` tbsp of red food coloring. He has plenty of water, but he only has `24` tbsp of raspberry juice and `21` tbsp of strawberry juice.What is the most food coloring Kiran can make using the ingredients he has? Fill in the missing numbers to complete the pattern:1.52, 1.77,2.27,2.77Submit Can you help me please. If i have an 86% in my math class and i got 2.8/10 on an assignment how much would my grade drop Find the 16th term of the sequence defined by the explicit rule. Assume that the domain of the function isthe set of whole numbers greater than 0.f(n)=9n - 8The 16th term of the sequence defined by f (n)=9n 8 is 6. My brother wants to be on the basketball team. He's lazy about practicing.The most effective way to combine these sentences would be:a. My brother wants to be on the basketball team, and he's lazy about practicing.b. My brother wants to be on the basketball team, but he's lazy about practicing.c. My brother wants to be on the basketball team, so he's lazy about practicing. my tnh co j vui gii thch choa tui bit i The products of a neutralization reaction are ________ and ________ a salt. Which statement best describes a scatter plot If f(x) = 2x and g(x) = 5x + 2, what is (f g)(x) when x = 3 Which sentence most clearly describes the structure of a story (Explain you answer)A. All of the problems the characters stem from their immaturityB. Science Fiction elements fills a story that's mostly about growing upC. Exposition is thin in the story; the audience has to do a lot of guessingD. The main conflict is between a hiker and the dangers of nature I need the answers asap Pipe A can fill a tank in 5 hours. Pipe B can fill the same tank in 7 hours. If both pipes were open, how long would it take them to fill an empty tank? Please help !!!! I need this Determine whether the equation is a linear equation. If so, write the equation in standard form.13. y + 9 = -2x3 Which of the following statements is true? Most countries have laws and court procedures protecting intellectual property such as those in the United States. Civil laws tend to be relatively nonspecific. Laws of a country regulate the manner in which business transactions are executed. Global entrepreneurs cannot specify in the contract that any contract disputes will be heard in the courts of another country. Solid carbon and oxygen gas combine to form carbon dioxide gas .