Which of the following is NOT an example of worksheet documentation?
A) Descriptive drop-down documentation menus
B) Descriptive worksheet names
C) Descriptive cell labels
D) Descriptive column titles
Answer: A
Computer Science & Information Technology
You might also like to view...
The logical network perimeter mechanism can be used to control the bandwidth made available to isolated IT resources.
a. True b. False
Computer Science & Information Technology
The Center button on the HOME tab centers the text ________ in the cell
Fill in the blank(s) with correct word
Computer Science & Information Technology
There is an upgrade path from Windows XP to Windows 7
Indicate whether the statement is true or false
Computer Science & Information Technology
What type of attack occurs when an attacker can bypass the application's security mechanism to access the application's resources?
A. SQL Code injection B. Time bomb C. Back door D. Cross site scripting
Computer Science & Information Technology