It is important to realize the Spell Check feature will not find all data entry mistakes so you will need to use additional ________ methods to ensure accuracy of the data

A) grammar B) proofreading C) AutoCorrect D) spelling


B

Computer Science & Information Technology

You might also like to view...

In the context of network security, ___________ is the ability to limit and control the access to host systems and applications via communications links.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Macro actions can be selected from the Action Catalog pane or from the Add New Action box

Indicate whether the statement is true or false

Computer Science & Information Technology

Which statement is not correct? The VSAM structure

A. is used for very large files that need both direct access and batch processing. B. may use an overflow area for records. C. provides an exact physical address for each record. D. is appropriate for files that require few insertions or deletions.

Computer Science & Information Technology

There are private IP address classes that are used on private networks that do not need to be accessed directly from the public Internet.

Indicate whether the answer is true or false

Computer Science & Information Technology