After selecting a column, pressing the shortcut key ________ will insert a new column
Fill in the blank(s) with the appropriate word(s).
Answer: Ctrl + +
You might also like to view...
All of the following statements are TRUE about data validation EXCEPT:
A) Each of the validation criteria can be specified with an input message and/or an Error Alert. B) Data validation restricts a single validation criteria per cell. C) Custom validation can be used to apply multiple validation criteria to a cell. D) An Error Message appears when a user makes a validated cell active and prompts a user before data is entered with information about data constraints.
What is the difference between a default VLAN and a native VLAN?
What will be an ideal response?
The SSID broadcast for a wireless router has been disabled but a network administrator notices that unauthorized users are accessing the wireless network. The administor has determined that attackers are still able to detect the presence of the wireless network despite the fact the SSID has been disabled. Which of the following would further obscure the presence of the wireless network?
A. Upgrade the encryption to WPA or WPA2 B. Create a non-zero length SSID for the wireless router C. Reroute wireless users to a honeypot D. Disable responses to a broadcast probe request
Discuss the algebra of authentication and its implications for privacy. That is, assume a situation with two-factor authentication, and call the factors A and B. Consider the four cases in which each one is strong or weak. What conclusions would you draw about the results: weak A and weak B; weak A and strong B; strong A and weak B; strong A and strong B? Does order matter? Does it matter if both factors are of the same type (what you know, what you have, what you are)? What happens if you add a third factor, C?
What will be an ideal response?