You want to make sure employees enter data only in particular cells and not change or delete other data. What is the first step?
What will be an ideal response?
Unlock cells that will be used for data entry.
Computer Science & Information Technology
You might also like to view...
A memory address is
a. Where a variable is stored b. Where the computer is located c. A step in the program. d. Where the CPU is stored.
Computer Science & Information Technology
Write a program that reads every line in a text file, removes the first word from each line, and then writes the resulting lines to a new text file.
What will be an ideal response?
Computer Science & Information Technology
The bottom of a line of text, not including descending portions of characters, is known as the text ____.
A. plumb line B. baseline C. depth D. height
Computer Science & Information Technology
Use ________ to apply preselected borders by brushing them on a border with the mouse
Fill in the blank(s) with correct word
Computer Science & Information Technology