Clicking the Show Formulas button in the Formula Auditing group on the Formula tab displays the ________ in the appropriate cells

A) underlying formulas B) displayed values
C) displayed formulas D) underlying values


A

Computer Science & Information Technology

You might also like to view...

Describe how the keys are used to encrypt and unencrypt data with public-key encryption.

What will be an ideal response?

Computer Science & Information Technology

What is a method that uses another method considered to be?

A. a method peer B. a server method C. a method pair D. a client of the other method

Computer Science & Information Technology

The keyword that specifies the table (or tables) that will be searched.

What will be an ideal response?

Computer Science & Information Technology

When you use the ________ function, the first column in the array is used to look up the value.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology