A spreadsheet can also be called a(n) ________
A) worksheet B) note C) cell D) tab
A
Computer Science & Information Technology
You might also like to view...
Describe the two types of recovery objectives you should build for each production database under different risk scenarios.
What will be an ideal response?
Computer Science & Information Technology
The active cell is marked with a _____ outline.
A. black B. green C. blue D. red
Computer Science & Information Technology
Which of the following is not one of the four anomalies that may occur when creating database tables?
A) data redundancy B) update anomaly C) primary anomaly D) insert anomaly E) deletion anomaly
Computer Science & Information Technology
Which of the following refers to a successful attempt to compromise a system's security?
A. discovery B. exploit C. break-in D. gateway
Computer Science & Information Technology