Clicking the Show Formulas button in the Formula Auditing group on the Formula tab displays the ________ in the appropriate cells
A) underlying formulas B) displayed values
C) displayed formulas D) underlying values
A
Computer Science & Information Technology
You might also like to view...
Describe how the keys are used to encrypt and unencrypt data with public-key encryption.
What will be an ideal response?
Computer Science & Information Technology
What is a method that uses another method considered to be?
A. a method peer B. a server method C. a method pair D. a client of the other method
Computer Science & Information Technology
The keyword that specifies the table (or tables) that will be searched.
What will be an ideal response?
Computer Science & Information Technology
When you use the ________ function, the first column in the array is used to look up the value.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology