A spreadsheet can also be called a(n) ________

A) worksheet B) note C) cell D) tab


A

Computer Science & Information Technology

You might also like to view...

Describe the two types of recovery objectives you should build for each production database under different risk scenarios.

What will be an ideal response?

Computer Science & Information Technology

The active cell is marked with a _____ outline.

A. black B. green C. blue D. red

Computer Science & Information Technology

Which of the following is not one of the four anomalies that may occur when creating database tables?

A) data redundancy B) update anomaly C) primary anomaly D) insert anomaly E) deletion anomaly

Computer Science & Information Technology

Which of the following refers to a successful attempt to compromise a system's security?

A. discovery B. exploit C. break-in D. gateway

Computer Science & Information Technology