Trace lines are applied in the ________ process

A) subtotaling
B) delimiting
C) filtering
D) formula
auditing


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following can be done to harden an operating system?

A) Uninstall unneeded applications or utilities B) Close unused ports C) Apply the latest security patches and fixes D) All of the above

Computer Science & Information Technology

A Cup class, Mug, and Cocoa class have what type of C++ relationships?

A. The Cocoa uses a Cup, and the Cup is a Mug. B. The Mug has a Cocoa, and the Cup is a Mug. C. The Cocoa has a Cup, and the Mug is a Cup D. The Mug has Cocoa, and the Mug is a Cup.

Computer Science & Information Technology

Match the e-mail header information with its description

I. To A. Used if sender requests an automated confirmation of the recipient having read the e-mail II. X-Confirm-Reading-To B. Easily spoofed by hackers III. Content-Type C. Nonstandard heading sometimes used when encountering a mailing list IV. Apparently-To D. Deals with non-text items such as photos

Computer Science & Information Technology

In the Relationships window, a join line shows the relationship between fields.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology