A(n) ________ cell reference changes when a formula or function is copied from one location to another location

Fill in the blank(s) with the appropriate word(s).


Answer: relative

Computer Science & Information Technology

You might also like to view...

Often, incidents of ___________ involve employees of the organization, surprisingly enough.

a. intrusion b. disruption c. controlled chaos d. destruction e. disaster

Computer Science & Information Technology

What is the name of a cryptographic attack based on a database of pre-computed hash values and the original plaintext values?

A. Brute force attack B. Rainbow table attack C. Frequency analysis D. Chosen plaintext attack

Computer Science & Information Technology

multiplications before additions" is an example of ______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which type of attack refers to the use of human interaction to gain access to a system or to do damage.

A. social engineering B. psychological warfare C. inside attack D. spoofing

Computer Science & Information Technology