Which of the following is not data that can have an Input Mask applied without creating a custom mask?
A. Phone number
B. Social Security number
C. Credit card number
D. Zip Code
Answer: C
Computer Science & Information Technology
You might also like to view...
The ____ list style type uses uppercase letters.
A. upper-alpha B. upper-arabic C. uppercase D. alphabetic
Computer Science & Information Technology
If you leave the product key blank during installation of Windows 7, you will have _____ days to activate Windows, at which time you must supply a valid product key
a. 7 b. 30 c. 60 d. 90
Computer Science & Information Technology
As related to infrastructure, incidents can and will vary in size and scope.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The ________ are the cells containing variables whose values change within the constraints until the objective cell reaches its optimum value.
A. goal seek cells B. changing variable cells C. objective cells D. constraints
Computer Science & Information Technology