Track Changes works only on ________ workbooks

A) read only
B) non-shareable
C) enabled
D) shared

D

Computer Science & Information Technology

You might also like to view...

The four approaches to identifying and mitigating risks to an organization’s IT infrastructure are: baseline approach, detailed risk analysis, combined approach, and __________ approach.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

It is common practice to use a __________ variable as a size declarator.

a. static b. reference c. final d. boolean

Computer Science & Information Technology