The solution to the problem that Word2010 cannot be revoked can be solved by modifying the registry. The steps are as follows:
Open the registry editor. Press Win R, type regedit in the run box and click OK.
In the Registry Editor, expand to the following registry subkey: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Word\Options
On the Edit menu, point to New, and then click DWORD Value. Select Change New Value #1, type UndoHistory, and press OK.
On the Edit menu, click Modify. In the Edit DWORD Value dialog box, under Base, click Decimal. Type a value between 0 and 100 in the Value box, click OK, and then exit Registry Editor. This value is the number of Undo (reversible) times. It is not recommended to set it too high. Generally, it can be set to 10. If it is too large, it will occupy more memory resources.
Recommendation: Word beginner tutorial
The above is the detailed content of How to solve the problem that word 2010 suddenly cannot be undoed. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Zend Studio 13.0.1
Powerful PHP integrated development environment

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

SublimeText3 Chinese version
Chinese version, very easy to use

SublimeText3 Linux new version
SublimeText3 Linux latest version

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.
