_________________________ is a technique that can be used to conceal data that might not be relevant to a particular report or sensitive data that others should not see.

Fill in the blank(s) with the appropriate word(s).


Hiding cells

Computer Science & Information Technology

You might also like to view...

____ breaks must be placed within grouping elements, such as paragraphs or headings.

A. Space B. Block C. Line D. List

Computer Science & Information Technology

A widely used encryption algorithm is

a. PGP b. RSA c. CRC d. DTR

Computer Science & Information Technology

Anyone who unlawfully breaks into an individual computer or a computer network is called a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Algunos botones son como los interruptores de luz: un clic enciende la característica y el siguiente clic la apaga. A esto se le llama frecuentemente ____.

A. encendido/apagado B. punto de acceso C. uno/dos D. alternancia

Computer Science & Information Technology