Excel 2010 provides Backstage view to allow you to perform all of the following functions on your Excel workbooks EXCEPT ____.

A. opening
B. saving
C. indexing
D. closing


Answer: C

Computer Science & Information Technology

You might also like to view...

If a program throws an exception before delete has been called on a pointer, it creates a memory leak. After an exception is thrown, a(n) ________ destructor will still be called, which calls delete on the pointer for you.

a. reference’s b. inherited c. smart pointer’s d. virtual

Computer Science & Information Technology

Slides that are adjacent to each other in a presentation are called ________ slides

Fill in the blank(s) with correct word

Computer Science & Information Technology

Identify the letter of the choice that best matches the phrase or definition.

A. Pre-publishing testing by people B. Ensures that all of your pages are attached to correct templates and style sheets for consistency C. Provides details about site pages D. One of the reports in the Problems category of the Site Summary report E. One of the reports in the Shared Content category of the Site Summary report F. Format of a report that allows for easy sharing of its content with others G. Selected within the Accessibility Checker H. A software program that responds to requests from browsers I. Provides your connection to the Internet J. Allows a company space on a server to store the necessary programs and files to keep an Internet connection open and secure at all times

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. The purpose of the privacy functions is to provide a user protection against discovery and misuse of identity by other users. 2. The Common Criteria specification is primarily concerned with the privacy of personal information concerning the individual rather than the privacy of an individual with respect to that individual’s use of computer resources. 3. Computer technology has involved the creation of new types of entities for which no agreed ethical rules have previously been formed. 4. Anyone can join the Ad Hoc Committee on Responsible Computing. 5. The first comprehensive privacy legislation adopted in the United States was the Privacy Act of 1974.

Computer Science & Information Technology