Critical Thinking QuestionsCase 3-2Your new volunteer position is to work with middle school youth in the computer lab. The Volunteer Coordinator has asked if you would be available to answer student questions during today's lab session. Becky is spell-checking her presentation. PowerPoint has marked a proper name as misspelled; but Becky is sure that the spelling is correct. She asks how to indicate that the word is correctly spelled. You tell her to click the _____ button in the Spelling dialog box.
a. Suggestc. Closeb. Changed. Ignore

What will be an ideal response?


Answer: D

Computer Science & Information Technology

You might also like to view...

Describe the systems development method you plan to use, and explain the pros and cons of using this method.

What will be an ideal response?

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

1. You must specify a C-string’s maximum length in brackets immediately after it’s declared. 2. The close() function takes one argument. 3. C++ supports physical file objects. 4. In addition to the get() method, all input streams have a set() method for putting the last character read from an input stream back on the stream. 5. When a program is executed, the standard input stream cin is connected to the standard input device

Computer Science & Information Technology

The mailing notation CONFIDENTIAL is ____.

A. keyed at the left margin at about 1" on the envelope B. keyed at the right on the envelope below the stamp at about 1" C. not keyed on the envelope D. keyed on the letter one blank line below the letter address

Computer Science & Information Technology

Tab ____ are the lines that appear in front of tabbed text.

A. underlines B. leaders C. indicators D. headers

Computer Science & Information Technology