Which of the following is not data that can have an Input Mask applied without creating a custom mask?

A. Phone number
B. Social Security number
C. Credit card number
D. Zip Code


Answer: C

Computer Science & Information Technology

You might also like to view...

The ____ list style type uses uppercase letters.

A. upper-alpha B. upper-arabic C. uppercase D. alphabetic

Computer Science & Information Technology

If you leave the product key blank during installation of Windows 7, you will have _____ days to activate Windows, at which time you must supply a valid product key

a. 7 b. 30 c. 60 d. 90

Computer Science & Information Technology

As related to infrastructure, incidents can and will vary in size and scope.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ________ are the cells containing variables whose values change within the constraints until the objective cell reaches its optimum value.

A. goal seek cells B. changing variable cells C. objective cells D. constraints

Computer Science & Information Technology