The layout of a table is NOT modified by ________

A) deleting columns B) entering text
C) changing row height D) inserting rows


B

Computer Science & Information Technology

You might also like to view...

Match the following keyboard shortcuts in many programs with their function:

I. Ctrl+C II. Ctrl+V III. Ctrl+Z IV. Ctrl+X V. Ctrl+A A. Copy B. Paste C. Select all D. Undo E. Cut

Computer Science & Information Technology

To change a table back to a range of data, click ________ located in the Tools group on the Design tab

A) Convert to Cells B) Convert to Data C) Convert to Information D) Convert to Range

Computer Science & Information Technology

Where do you configure Domain Name System (DNS) for a Windows system?

What will be an ideal response?

Computer Science & Information Technology

Distinguish between security in SNMP V1 and security in SNMP V2

A. SNMP v1 and v2 have strong security. B. SNMP v1 and v2 had no security at all. C. SNMP v1 had no security at all. SNMP v2 introduces community strings in which a shared secret between manager and managed devices was used to authenticate messages. D. SNMP v2 had no security at all. SNMP v1 introduces community strings in which a shared secret between manager and managed devices was used to authenticate messages.

Computer Science & Information Technology