_________________________ is a technique that can be used to conceal data that might not be relevant to a particular report or sensitive data that others should not see.
Fill in the blank(s) with the appropriate word(s).
Hiding cells
Computer Science & Information Technology
You might also like to view...
____ breaks must be placed within grouping elements, such as paragraphs or headings.
A. Space B. Block C. Line D. List
Computer Science & Information Technology
A widely used encryption algorithm is
a. PGP b. RSA c. CRC d. DTR
Computer Science & Information Technology
Anyone who unlawfully breaks into an individual computer or a computer network is called a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
Algunos botones son como los interruptores de luz: un clic enciende la característica y el siguiente clic la apaga. A esto se le llama frecuentemente ____.
A. encendido/apagado B. punto de acceso C. uno/dos D. alternancia
Computer Science & Information Technology