What feature allows you to access previous copies of a document on OneDrive?

File storage
Recover file
Stored work
Version history

Answers

Answer 1

Version history feature

OneDrive's Version history feature allows you to view older versions of an Office Online document. If you find a version you want, you can then restore it, moving it to the top of the list as the latest version of the file.

Answer 2

Answer:

Version history

Explanation:


Related Questions

How many bits are in a single byte?

Answers

Answer:

8. One byte is 8 bits, 2 bytes is 16 bits, etc

somebody pls help!!! i don’t know what i did but i don’t know how to fix it

somebody pls help!!! i dont know what i did but i dont know how to fix it

Answers

Answer:

Try refreshing, it doesn't look like you did anything wrong. Refreshing usually fixes it, or close the tab and reopen it. That should fix it.

Explanation:

Which of the following statements is something the operations system of a computer is responsible for doing? Managing memory allocation for all apps.
Providing a way for the user to create text docs
allowing the user to access the internet.
Allowing the user to write programs

Answers

Explanation:

took the test

Which of the following statements is something the operations system of a computer is responsible for

The statement "Managing memory allocation for all apps" is something the operations system of a computer is responsible for doing. So, option 1 is true.

Ask about the statements that are something the operations system of a computer is responsible for doing.

The operating system handles memory management, ensuring that different applications have appropriate memory allocation and can efficiently utilize system resources.

It is not directly responsible for providing a way to create text documents, accessing the internet, or allowing the user to write programs, although these functionalities can be facilitated by certain applications or tools within the operating system.

Therefore, option 2 is true.

To know more about the operating system visit:-

https://brainly.com/question/30692693

#SPJ3

It is only likely for a guest to receive outstanding service at luxury brands. That's why Ritz-Carlton, Mandarin Oriental, Four Seasons, and others are the best at what they do.

Answers

Answer:

FALSE

Explanation:

you have a shared folder named reports. members of the managers group have been given write access to the shared folder. mark mangum is a member of the managers group. he needs access to the files in the reports folder, but he should not have any access to the confidential.xls file. what should you do? answer configure ntfs permissions for confidential.xls to allow read-only. add mark mangum to the acl for the reports directory with deny permissions. add mark mangum to the acl for the confidential.xls file with deny permissions. remove mark mangum from the managers group.

Answers

The next you should do is to C: add Mark Mangum to the ACL for the 'confidential.xls' file with Deny permissions.

An access control list or ACL includes rules that grant or deny access permissions to certain digital environments. According to the given scenarios where a shared folder named reports, is given written access to the group of managers. A member of the group named Mark Magnum requires access to files in the reports folder, but he is restricted to not to access the confidential.xls file. To meet the goal, Mark Magnum is added to the ACL for the 'confidential.xls' file with Deny permissions.

You can learn more about ACL at

https://brainly.com/question/14464816

#SPJ4

Which questions do you expect could be queried from a database of dinosaur exhibits at a museum?
Select all that apply.
0 What will the weather be like next week?
Which exhibits were on display in September 2010?
Which fossil has been displayed the most often in the last five years?
Which exhibit is the best?
Why did some patrons not enjoy the current exhibits as much as the last ones?
When was the Tyrannosaurus last on display?

Answers

Answer:

B C F

Explanation:

I couldn't find the answer so I did it myself and i actually got it right. It's easy to do but here is the answer anyways.:)

Answer:

B). Which exhibits were on display in September 2010?

C). Which fossil has been displayed the most often in the last five years?

F). When was the Tyrannosaurus last on display?

Explanation:

I just did the Part 1 on EDGE2022 and it's 200% correct!

Also, heart and rate if you found this answer helpful!! :) (P.S It makes me feel good to know I helped someone today!!)

Which questions do you expect could be queried from a database of dinosaur exhibits at a museum?Select

explain the structure of c program with example

Answers

Answer:

A C program typically consists of a number of components, including preprocessor directives, function prototypes, global variables, functions, and a main function.

Explanation:

Here's an explanation of each component, followed by an example C program that demonstrates their usage:

Preprocessor Directives: Preprocessor directives are instructions to the C preprocessor, which processes the source code before compilation. They usually start with a '#' symbol. Some common directives are #include for including header files and #define for defining constants.

Function Prototypes: Function prototypes provide a declaration of functions that will be used in the program. They specify the function's name, return type, and the types of its parameters.

Global Variables: Global variables are variables that can be accessed by any function in the program. They are usually defined outside of any function.

Functions: Functions are blocks of code that can be called by name to perform specific tasks. They can accept input parameters and return a value. Functions are generally declared before the main function.

Main Function: The main function is the entry point of the program. It's where the execution starts and ends. It has a return type of int and typically takes command-line arguments via two parameters: argc (argument count) and argv (argument vector).

Here's an example C program that demonstrates the structure:

// Preprocessor directives

#include <stdio.h>

// Function prototypes

void print_hello_world(void);

// Global variable

int global_var = 10;

// Functions

void print_hello_world(void) {

   printf("Hello, World!\n");

}

// Main function

int main(int argc, char *argv[]) {

   // Local variable

   int local_var = 20;

   printf("Global variable value: %d\n", global_var);

   printf("Local variable value: %d\n", local_var);

   print_hello_world();

   return 0;

}

This simple C program demonstrates the use of preprocessor directives, a function prototype, a global variable, a function, and the main function. When run, it prints the values of a global and a local variable, followed by "Hello, World!".

What allows a programmer to write code quickly and efficiently for an action that must be repeated?
an iteration
an index
an argument
a queue

Answers

an literation :))!! i hope u get it right lol

A programmer is allowed to write code quickly and efficiently for an action that must be repeated  by iteration.

What is programmer?

A programmer is a person who writes or creates the programs to perform a specific task.

A professional programmer can write code quickly and efficiently. The action that requires repetition, is called iteration.

Thus, an iteration allows a programmer to write code quickly and efficiently for an action that must be repeated.

Learn more about programmer.

https://brainly.com/question/11345571

#SPJ2

write a qbasic programme to find the volume of a box asking length,breadth, and height from user

Answers

Answer:

CLS

Input "length of box" ; L

Input "breadth of box" ; B

Input "height of box" ; H

LET Volume(V) = L*B*H

Print Volume

END

Write a short note on the topic ,' My Brother'.​

Answers

Answer:

I have an older brother whose name is Michael.

He is two years older than me and studies in Class 3.

My brother has a round face with black hair and brown eyes.

He is very caring, loving and outgoing by nature.

He takes care of me, whenever my parents are not at home.

He shares his toys with me, whenever we are playing indoors.

My brother is a well-mannered boy who is loved by everyone.

He is very good in his studies and helps me in my studies too.

He is very sincere and intelligent and never misses his school.

I love my brother and always pray to God to help us maintain a strong bond forever.

Explanation:

Answer:

Explanation:

To begin with, a brother is an important member of the family because he loves his siblings like a father, cares like a mother and sometimes annoys his sister(s). Sibling relationships usually tend to be emotionally powerful. Therefore, building a strong brother-sister relationship is important not only in childhood, but for the entire lifetime. Siblings learn social skills from each other like negotiating power and managing conflicts among themselves.

Please help I have no idea what to do :(



Write a program that simulates a coin flipping. Each time the program runs, it should print either “Heads” or “Tails”.

There should be a 0.5 probability that “Heads” is printed, and a 0.5 probability that “Tails” is printed.

There is no actual coin being flipped inside of the computer, and there is no simulation of a metal coin actually flipping through space. Instead, we are using a simplified model of the situation, we simply generate a random probability, with a 50% chance of being true, and a 50% chance of being false.

Answers

A Java Script program that simulates a coin flipping, so that each time the program runs, it should print either “Heads” or “Tails” along with the other details given is stated below.

Code for the above coin simulation

var NUM_FLIPS = 10;

var RANDOM = Randomizer.nextBoolean();

var HEADS = "Heads";

var TAILS = "Tails";

function start(){

var flips = flipCoins();

printArray(flips);

countHeadsAndTails(flips);

}

// This function should flip a coin NUM_FLIPS

// times, and add the result to an array. We

// return the result to the caller.

function flipCoins(){

var flips = [];

for(var i = 0; i < NUM_FLIPS; i++){

if(Randomizer.nextBoolean()){

flips.push(HEADS);

}else{

flips.push(TAILS);

}

}

return flips;

}

function printArray(arr){

for(var i = 0; i < arr.length; i++){

println("Flip Number " + (i+1) + ": " + arr[i]);

}

}

function countHeadsAndTails(flips){

   var countOne = 0;

   var countTwo = 0;

   for(var i = 0; i < flips.length; i++){

       if(flips[i] == HEADS){

           countOne+=1;

       }

       else {

           countTwo+=1;

       }

   }

   println("Number of Heads: " + countOne);

   println("Number of Tails: " + countTwo);

}

Learn more about Java Script:
https://brainly.com/question/18554491
#SPJ1

Your data set is total sales per month. What does the value $500.0 in this image of the Status Bar tell you? Profits Average: $346.7 Count: 3 Numerical Count: 3 Min: $240.0 Max: $500.0 Sum: $1,040.0​

Answers

Note that where the Status Bar in Microsoft Excel indicates $500, this refers "the largest dollar amount of sales across all 12 months" in the referenced data set.

What is the rationale for the above response?

Note that $500 refers to the highest numerical value in the currently selected range of cells. It is a quick way to obtain the maximum value without having to use a formula or function. This can be useful in data analysis to quickly identify the highest value in a set of data.

The status bar in software applications such as Microsoft Excel, Word, and other productivity tools is important because it provides users with real-time information and quick access to certain features and settings.

For example, in Microsoft Excel, the status bar provides users with important information such as the current cell mode, whether the num lock is on or off, the average, count, and sum of selected cells, and the maximum and minimum values of selected cells.

Learn more about Data Set:
https://brainly.com/question/16300950
#SPJ1

Your data set is total sales per month. What does the value $500.0 in this image of the Status Bar tell

Name a tool that can be used to test cross platform compatibility. What are the common errors that you would encounter in terms of usability of a website and how would you rectify them to ensure cross platform compatibility?

Answers

LambdaTest is a  a tool that can be used to test cross platform compatibility.

The common errors that you would encounter in terms of usability of a website are:

Poorly  put together or Structured Links.Too much Website Text.Lack of Consistency.

What are mistakes in usability?

Anything in a product or website that causes a user to reach an unfavorable conclusion is a usability problem. When people experience issues with a UI, it's one that may be obvious. It's more tougher to know what to do about them, if anything at all. Consistency: The positioning of the buttons, headers, and other design elements must be correct.

Testing a program or piece of software across multiple platforms to make sure it functions properly on each one is known as cross-platform testing. Different platforms may support various web browsers, operating systems, and devices.

Therefore, the way to prevent Browser Compatibility Problems are:

Validate CSS and HTML. Keep the layout compatible. Employ CSS Resets.

Learn more about cross platform from

https://brainly.com/question/29356066
#SPJ1

what are the difference between bit address 7ch and byte address 7ch

Answers

so a byte address can only send  a get bytes (8 bits)

when a bit address can be more detailed as it can send a get not only bytes but bits also

-scav

What is the running time to perform the following operations: (a) minimum (b) maximum (c) median (d) average (e) search/look-up (f) predecessor (g) successor, for a dynamic set with n keys implemented using the following data structures: (a) binary search tree (b) hash table based dictionary (c) direct address based dictionary (d) red-back tree (e) van-emde boas tree.

Answers

The running time that is used for a lot of operations in a lot of data structures for any given dynamic set with n keys are known to be given below.

What is the running time  about?

In terms of  (a) Minimum time they are:

Binary search tree: This is seen as O(h), and it is one where h is seen as the height of the said tree.

In terms of Hash table based dictionary: It is one that is not applicable, as it is one where the hash tables do not aid or support any form of finding of any kind in terms of the minimum element.

Lastly in terms of Direct address based dictionary: O(1) is one that is seen as as the minimum element that is it is one that can be directly accessed via the use of its key. Red-black tree: is one where the O(1), is one that act as red-black trees that tends to keep a subtree via the use of the minimum element found at its root.

Learn more about running time  from

https://brainly.com/question/26046491

#SPJ1

What is the running time to perform the following operations: (a) minimum (b) maximum (c) median (d)

Modify theme in excel

Answers

Answer:

Explanation:

Theme may be explained as a group of different formatting options such as appearance, color, font size and so on, which could be applied on a workbook simultaneously (without having to manually format each change to the document one after the other.) Once a certain theme is selected, all formating options related to the theme is applied to the document. Themes are located in the page layout tab in excel. However, one can modify or edit each of the individual properties or options of a certain theme. Such that by the time, the theme modification would have been effected.

A keyboard would be considered what 2 things

Answers

Answer:

A typing tool and a weapon

Explanation:

which encryption protocol does gre use to increase the security of its transmissions?

Answers

Utilizing IPsec for security during transmission is the encryption protocol used to strengthen the security of its transmissions. The right answer is c.

The encryption algorithm performs encryption. To perform encryption, encryption algorithms are utilized. These algorithms use the encryption key to carry out all cryptographic operations on the plaintext material. These methods are then used in encryption protocols to protect data for a number of objectives. A security protocol (also known as a cryptography protocol or encryption protocol) is a concrete or abstract protocol that carries out a security-related task while also employing cryptographic techniques, frequently in the form of sequences of cryptographic primitives. As a result, the encryption protocol to boost security is IPsec, which is option c.

The complete question-  Your most probably complete question is given below:

a. SSL b. SFTP c. IPsec d. SSH.

Learn more about protocol here-

https://brainly.com/question/27581708

#SPJ4

This image shows a web designer's grids for different pages on a website. The uppermost box on each page is the website's identity. Which important
feature of a good website has the designer violated?
A simplicity
B.
consistency
Ос
clarity
D. harmony

This image shows a web designer's grids for different pages on a website. The uppermost box on each page

Answers

Answer: d

Explanation: hope this helps

Answer:

consistency

Explanation:

i got it right on plato

Your computer is taking longer than usual to open files and you notice that your hard drive light stays on longer than usual which of the following is a possible solution to counteract this one and install any recently added Southward and review to ensure that the recycle bin is empty clear Internet history and cookies and remove any unused files for the desktop three defrag the hard drive or four change the computer power settings to minimal

Answers

Answer:

Clear out unused files

Explanation:

The reason whay the hard drive is so slow is probably because it full of junk. The recycle bin, old update files, cached data, etc. can easily fill up the hard drive, thus slowing it down.

What kind of variable is measured using 2 different values

Answers

A variable that is measured using two different values can be classified as a categorical variable or a binary variable.

Depending on the nature of the values, a variable can be classified as:

1)Categorical Variable: If the two different values represent distinct categories or groups, the variable is considered categorical. In this case, the variable can take on only one of two possible values.

Examples include gender (male/female), presence/absence of a certain trait, yes/no responses, or any other classification with mutually exclusive categories.

2)Binary Variable: If the two different values represent two distinct outcomes or states, the variable can be classified as a binary variable. Binary variables are often used in statistics, machine learning, and hypothesis testing.

Examples include success/failure, true/false, 1/0, or positive/negative results.

It's important to note that the distinction between categorical and binary variables lies in the nature of the values and the underlying meaning they convey.

Categorical variables can have more than two categories, while binary variables specifically refer to variables with only two possible values.

For more questions on variable

https://brainly.com/question/28248724

#SPJ8

describe usage about hand geometry biometric?

Answers

Biometrics for hand geometry recognition are less obvious than those for fingerprint or face recognition. Despite this, it is nevertheless applicable in numerous time/attendance and physical access applications.

What is Hand geometry biometric?

The concept that each person's hand geometry is distinct is the foundation of hand geometry recognition biometrics.

There is no documented proof that a person's hand geometry is unique, but given the likelihood of anatomical structure variance across a group of people, hand geometry can be regarded as a physiological trait of humans that can be used to distinguish one person from another.

David Sidlauskas first proposed the idea of hand geometry recognition in 1985, the year after the world's first hand geometry recognition device was commercially released.

Therefore, Biometrics for hand geometry recognition are less obvious than those for fingerprint or face recognition. Despite this, it is nevertheless applicable in numerous time/attendance and physical access applications.

To learn more about Hand geometry biometric, refer to the link:

https://brainly.com/question/12906978

#SPJ9

question below in attachment

Answers

You can use basic HTML elements like input, select and textarea to generate an HTML web-form and gather the data for the code table.

What is the program?

The form in this code case is configured to use the "post" method and directs to "insert_item.php", a PHP script that manages the form submissions. The structure comprises of input sections for the "name", "description", and "quantity" cells in the "item" table, as well as a button for submitting the information.

One method of collecting user input from a web-form and adding it to a database table is by utilizing PHP and SQL commands, which enables connectivity to the database and the ability to run the INSERT query.

Learn more about  program from

https://brainly.com/question/26134656

#SPJ1

question below in attachment
question below in attachment
question below in attachment

The current in a resistor is 5.0 A, and its power is 60 W. What is the voltage?

Answers

Explanation:

Applying Ohm's law, we have that the formula for power is a product of the current and voltage in the resistor.

\(P = I \times V\)

P = 60 W and I = 5.0 A

\(60 = 5 \times V \)

\(V = 60 \div 5 \)

\(V = 12 V \)

Hope this helped!

The voltage on a resistor will be "12 V".

According to the given question,

Current,

I = 5.0 A

Power,

P = 60

As we know the formula,

→ \(Power (P)= Current(I)\times Voltage (V)\)

or,

→              \(V = \frac{P}{I}\)

By putting the giving values, we get

→                  \(= \frac{60}{5}\)

→                  \(= 12 \ V\)

Thus the solution above is right.

Learn more about voltage here:

https://brainly.com/question/18883096

The current in a resistor is 5.0 A, and its power is 60 W. What is the voltage?

Which of the following are good candidates for a primary key field for a Customer table? Select all the options that apply.IdentificationNumber
CustomerNumber
CustomerID

Answers

Good possibilities for a primary key field in a customer table are Identification Number.

What field should be the employee table's primary key?

Why and which field in the Employee table should serve as the primary key? The primary key serves as a special code for the information and records in the table. The Social Security Number should be used as the primary key in the Employee table. Each individual allocated to the sheet has a different code.

What do the table's candidate and primary key represent?

Describe a candidate key. Another term for a candidate key is a collection of several properties (or a single feature) that aid in distinctly distinguishing the tuples present in a table or relation.

To know more about primary key visit :-

https://brainly.com/question/13437797

#SPJ4

explain approaches of AI​

Answers

A-artificial I-intelligent

Answer:

Main AI Approaches

There are three related concepts that have been frequently used in recent years: AI, machine learning, and deep learning.

The value u+203e belongs to which coding system

Answers

The value "u+203e" belongs to the Unicode coding system.

How is this so?

Unicode is a universal character encoding standard that assigns unique numeric codes to characters   from various writing systems,including alphabets, ideographs, symbols, and more.

The "u+203e" value specifically refers to a Unicode code point, which represents the character "OVERLINE." Unicode ensures consistency in representing and exchanging text across different platforms, programming languages, and systems.

Learn more about coding  at:

https://brainly.com/question/27639923

#SPJ1

Question 2 of 10
How can formal business documents help managers solve problems?
A. By eliminating the need for schedules and budgets to track
progress
B. By creating a record of every action taken during a meeting
OC. By presenting well-organized, accurate information about a
problem
OD. By making decisions so the managers do not have to handle them
SUBMIT

Answers

Note that  formal business documents help managers solve problems "By creating a record of every action taken during a meeting" (option B)

What is problem solving?

Problem solving, which is a common aspect of most activities, is the process of reaching a goal by overcoming barriers. Problems that require resolution span from modest daily duties to big difficulties in business and technology.

Any contractual agreement that establishes the existence of a contractual connection between parties such as the FPI professional member and his/her customer is referred to as a formal document. Such legal documents may include, but are not limited to, a Service Level Agreement and an Advice Agreement.

Learn more about formal documents:

https://brainly.com/question/29314512?
#SPJ1

What makes a source credible?

It is found online.
It contains bias.
It is believable or trustworthy.
It supports multiple perspectives.

Answers

Answer:

C It is believable or trust worthy

Answer:

It's C: It is believable or trustworthy.

Explanation:

I got it right.

A ______ can hold a sequence of characters such as a name.

Answers

A string can hold a sequence of characters, such as a name.

What is a string?

A string is frequently implemented as an array data structure of bytes (or words) that records a sequence of elements, typically characters, using some character encoding. A string is typically thought of as a data type. Data types that are character strings are the most popular.

Any string of letters, numerals, punctuation, and other recognized characters can be stored in them. Mailing addresses, names, and descriptions are examples of common character strings.

Therefore, a string is capable of storing a group of characters, such as a name.

To learn more about string, refer to the link:

https://brainly.com/question/17091706

#SPJ9

Other Questions
When it comes to setting one's own quality standards, one must ensure they are.reviewedwrittenmeasurableprofitable does this company earn or lose money It is often helpful to remember the acronym PASS when using a fire extinguisher. Fill in the word that corresponds with each letter to complete the steps needed for operation of this device. P: ____ the pin A: _____ - the nozzle at the base of the fire. S: ______ the lever slowly S: _____ the spray from side to side over the fire. Can someone PLEASE help me? I need help ASAP its due today. Im trying to bring my grade up! Show work please! Which expression is equivalent to? PLEASE HELP I WILL GIVE BRAINLIEST Suppose that z varies jointly with x and y. When x = 2, y =2 and z = 7 3) Write the equation that models the relationship 4) Find 7 when x - 4 and y 8 Assume that a company is financed 75% with equity and 25% with debt. A decrease in the corporate tax rate of the firm will cause its weighted average cost of capital (WACC) to:_____.1. Rise.2. Fall.3. Stay constant4. More information is needed Depression caused by anger that cannot be expressed and is turned inward is an example of a(n) __________ cause. Environmental psychoanalytic biological hereditary. What was Pittsburgh Pennsylvania, like 100 years ago? a sociologist is walking on a city street and notices a film crew shooting a scene for a motion picture. the sociologist is most likely to be interested in the: What options may be available to a criminal defendant after he or she has been arraigned in Georgia? Select all that apply. A. The defendant may plead guilty to the crime he or she is accused of. B. The defendant may accept or reject a prosecutor's offer of a plea bargain. C. The defendant may request that his or her trial be held before a grand jury. D. The defendant may post bail and secure his or her freedom before the trial begins. E. The defendant may appeal the state's decision to file charges against him or her. F. The defendant may plead not guilty to the crime that he or she is accused of. Write and expression for the calculation add 9 to the product of 4 and 5 The quotient property of radicals requires the indices of the radicals to be the same. does this mean that it is not possible to write Which segment shows the substance changing from a gas to a liquid? X-Y Y-X W-X X-W Guys, Im giving you at least 100 points for you to answer to my angles, triangles, and quadrilaterals word problem homework package. So guys, please listen up and pay attention to me without ignoring my angles, triangles, and quadrilaterals word problem homework package for no reason! :D Please read my 2 of the geometric word problem questions carefully in order to get the clear understanding in order for you to get the Brainliest award if your answer is the best efforts and step-by-step explanations all of the time and heres an image for you to answer to my 2 of my geometric word problem questions. Please answer to my geometric word problem questions as soon as possible with the best efforts and the best step-by-step explanations in order to get the Brainliest award of all the time! :D Well anyways, guys, good luck on answering 3 math word problem questions of my my angles, triangles, and quadrilaterals word problem homework package in order to get the best Brainliest award of all of the time, and I will check the answers to see if its appropriate for me. :) Kristin spent $120 on shirts. Fancy shirts cost $35 and plain shirtscost $10. If she bought a total of 7 then how many of each kind didshe buy? crane music company sells three principal types of musical instruments, with varying percentages of gross profit on cost.On May 9, 2020 a fire destroyed Crane's office and the warehouse in which it stored the instruments. To file a report of loss for Insurance purposes, the company must know what the inventories were immediately preceding the fire. Unfortunately Crane Music Company did not maintain any perpetual inventory records. A general ledger was kept and computer records related to the ledger were backed up to the cloud nightly. You were able to ascertain the following from the general ledger. Part BUse this website from the federal government to research some of the regulatory agencies that you read about in this lesson. Under "Executive Branch Agencies, Commissions, and Committees," click on "Independent Agencies" or "Executive Department Sub-Agencies and Bureaus." Choose an agency that interests you and complete the chart to describe the type of regulatory policies your chosen agency sets and enforces and the kinds of influences that might affect these policies. just like take the points I'm going to fail my grades anyway 5) Lady Capulet hopes that her daughter will