_________________________ is a technique that can be used to conceal data that might not be relevant to a particular report or sensitive data that others should not see.

Fill in the blank(s) with the appropriate word(s).


Hiding cells

Computer Science & Information Technology

You might also like to view...

A list of operations that is displayed on the screen, allowing the user to select one of these options is known as a(n) __________.

a. list b. option list c. menu d. choice

Computer Science & Information Technology

The ________ requires that the table has to be free of transitive dependencies and that all lower levels of normal form are satisfied

A) 1NF B) 2NF C) 3NF D) BCNF

Computer Science & Information Technology

Give an example of when Format Painter could be used

What will be an ideal response?

Computer Science & Information Technology

The files you store in your ____________________ folder are available on OneDrive for anyone to view and edit.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology