To move within the table you can use all of the following, except _____.

A. press the arrow keys
B. type the name of the cell
C. press the Tab key
D. click the desired cell


Answer: B

Computer Science & Information Technology

You might also like to view...

A(n) ________ is a protocol developed by the IETF for directing packets in a wide-area IP network, or other WAN and adds a 32-bit label to each packet to improve network efficiency and to enable routers to direct packets along predefined routes in accordance with the required quality of service.

A) MPLS B) VPN C) WAN D) VTN

Computer Science & Information Technology

When you add new scenes to a document, you are essentially adding new ____________________ that contain their own frames with new content.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

BitLocker To Go provides protection only on portable drives formatted with the NTFS file system

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following security devices can receive and process HTTP requests from hosts to allow or deny traffic for web browsing purposes only?

A. Load balancer B. VPN concentrator C. Proxy server D. DNS server

Computer Science & Information Technology