Once a worksheet is protected, you must ________ any cells to which you want to allow changes

A) unlock
B) lock
C) protect
D) unprotect


Answer: A

Computer Science & Information Technology

You might also like to view...

In addition to performing calculations, ________ organize data that can be sorted and filtered, making it functional for lists and schedules

A) pie charts B) graphics C) spreadsheets D) documents

Computer Science & Information Technology

E1 and SONET use a derivative of the High-Level Data Link Control (HDLC) protocol as the control channel.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The geometric arrangement of connections (cables, wireless, or both) that link the nodes in a networked system is called a ____.

A. layout B. topology C. map D. physical network

Computer Science & Information Technology

You and your devices usually leave digital ________, which is a trail of your data, activity, and even the locations where devices are used.

A. logs B. footprints C. breadcrumbs D. dividers

Computer Science & Information Technology