Which of the following is NOT an example of worksheet documentation?

A) Descriptive drop-down documentation menus
B) Descriptive worksheet names
C) Descriptive cell labels
D) Descriptive column titles


Answer: A

Computer Science & Information Technology

You might also like to view...

The logical network perimeter mechanism can be used to control the bandwidth made available to isolated IT resources.

a. True b. False

Computer Science & Information Technology

The Center button on the HOME tab centers the text ________ in the cell

Fill in the blank(s) with correct word

Computer Science & Information Technology

There is an upgrade path from Windows XP to Windows 7

Indicate whether the statement is true or false

Computer Science & Information Technology

What type of attack occurs when an attacker can bypass the application's security mechanism to access the application's resources?

A. SQL Code injection B. Time bomb C. Back door D. Cross site scripting

Computer Science & Information Technology