In spreadsheet software, each cell has a unique cell ____.?
A. ?form
B. ?address
C. ?macro
D. ?vector
Answer: B
You might also like to view...
Windows is able to restore a single file, folder, or ____ from an incremental backup.
A. private folders B. library C. subfolders D. icons
A calculated field has a(n) ________ after the field name
Fill in the blank(s) with correct word
.dir files can be called by Director projectors for playback.
Answer the following statement true (T) or false (F)
Match each item with a statement below.
A. Created by management to guide the implementation and configuration of a specific technology so as to direct the way a technology is to be used to control the behavior of people in the organization. B. Provides detailed information and hands-on instruction to employees to prepare them to perform their duties securely. C. The set of activities taken to plan for, detect, and correct the impact of an incident on information assets. D. Ensures that critical business functions continue if a catastrophic incident or disaster occurs. E. Set of rules for the protection of an organization's information assets. F. Published, scrutinized, and ratified by a group. G. Informal part of an organization's culture. H. Basis for the design, selection, and implementation of all security program elements, including policy implementation, ongoing policy management, risk management programs, education and training programs, technological controls, and maintenance of the security program. I. Investigation and assessment of the impact that various attacks can have on the organization.