_________________________ is a technique that can be used to conceal data that might not be relevant to a particular report or sensitive data that others should not see.
Fill in the blank(s) with the appropriate word(s).
Hiding cells
Computer Science & Information Technology
You might also like to view...
A list of operations that is displayed on the screen, allowing the user to select one of these options is known as a(n) __________.
a. list b. option list c. menu d. choice
Computer Science & Information Technology
The ________ requires that the table has to be free of transitive dependencies and that all lower levels of normal form are satisfied
A) 1NF B) 2NF C) 3NF D) BCNF
Computer Science & Information Technology
Give an example of when Format Painter could be used
What will be an ideal response?
Computer Science & Information Technology
The files you store in your ____________________ folder are available on OneDrive for anyone to view and edit.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology