In a PivotTable report, ________ are the fields use to categorize the data by rows

Fill in the blank(s) with the appropriate word(s).


Answer: row labels

Computer Science & Information Technology

You might also like to view...

Which of the following would most likely be a class (the others would be objects of a class):

a) Lassie b) my house c) George Washington d) flower

Computer Science & Information Technology

_________ would appear to be the most secure of the three Diffie-Hellman options because it results in a temporary, authenticated key. ?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A ____ contains a professionally designed combination of colors, graphics, fonts, and special effects.

A. gallery B. theme C. design frame D. motif

Computer Science & Information Technology

You sign in to your personal computer with your Microsoft account and then you want to set up your computer as a trusted device to make changes to the account settings. Microsoft sends a code to your cell phone in a text message. You enter the code on a Windows screen. This type of authentication is called:

a. Multifactor authentication b. Mutual authentication c. Biometric authentication d. None of the above

Computer Science & Information Technology