Critical Thinking QuestionsCase 1-2Your colleague Diane wants to take advantage of Outlook's spelling and grammar-checking capabilities, and she turns to you for help. A name of one of Diane's colleagues is flagged as a misspelling, and she would like to prevent this from happening. What steps should she take?
a. left-click the name, and click AutoCorrect on the shortcut menub. right-click the name, and click AutoCorrect on the shortcut menuc. left-click the name, and click Ignore on the shortcut menud. right-click the name, and click Ignore on the shortcut menu

What will be an ideal response?


Answer: D

Computer Science & Information Technology

You might also like to view...

The output of the encryption function is fed back to the shift register in Output Feedback mode, whereas in ___________ the ciphertext unit is fed back to the shift register.

A. Cipher Block Chaining mode B. Electronic Codebook mode C. Cipher Feedback mode D. Counter mode

Computer Science & Information Technology

Making critical sets of instructions either execute in order and in entirety or the changes they make are rolled back or prevented is a mitigation for what type of attack?

A. memory leak B. clickjacking C. time of check to time of use D. integer overflow

Computer Science & Information Technology

Which of the following web application security weaknesses can be mitigated by preventing the use of HTML tags?

A. LDAP injection B. SQL injection C. Error and exception handling D. Cross-site scripting

Computer Science & Information Technology

Which of the following virtualized components would provide a secure operating environment for a business user?

A. Virtual PBX B. Virtual switch C. Virtual desktop D. Virtual SAN

Computer Science & Information Technology