When you generate subtotals, all levels of detail show in a(n) ____.

A. outline
B. extracted table
C. list range
D. graph


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT a stage of a multimedia project?

a. Testing b. Planning and costing c. Designing and production d. Marketing e. Delivery

Computer Science & Information Technology

?Explain briefly about converting between numbers and text.

What will be an ideal response?

Computer Science & Information Technology

Which of the following BEST describes the weakness in WEP encryption?

A. The initialization vector of WEP uses a crack-able RC4 encryption algorithm. Once enough packets are captured an XOR operation can be performed and the asymmetric keys can be derived. B. The WEP key is stored in plain text and split in portions across 224 packets of random data. Once enough packets are sniffed the IV portion of the packets can be removed leaving the plain text key. C. The WEP key has a weak MD4 hashing algorithm used. A simple rainbow table can be used to generate key possibilities due to MD4 collisions. D. The WEP key is stored with a very small pool of random numbers to make the cipher text. As the random numbers are often reused it becomes easy to derive the remaining WEP key.

Computer Science & Information Technology

?Tables should only be used todesign a layout for a webpage.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology