The ________ command allows the user to find, and then substitute, word or phrases within the document

A) Scan B) Search C) Substitute D) Replace


D

Computer Science & Information Technology

You might also like to view...

____ are meant to optimize the cost/risk factors for information that would be lost.

A. Checkpoints B. Restore points C. Recovery points D. Backup points

Computer Science & Information Technology

By making allowances for inconsistently applied HTML code, the source code for the browser must be larger and more complex to deal with all contingencies.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The MVC architecture facilitates DRY programming and keeps the programming logic that controls application execution separate from the programming logic that manages the presentation of data.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What other components are important for computer performance besides RAM?

A) Type of optical drive B) Size of hard drive C) Amount of hard drive space D) Capacity of BIOS

Computer Science & Information Technology