To copy styles, both workbooks must be ________

Fill in the blank(s) with the appropriate word(s).

Answer: open

Computer Science & Information Technology

You might also like to view...

Which of the following physical security controls prevents an attacker from gaining access to a network closet?

A. CCTVs B. Proximity readers C. Motion sensors D. IP cameras

Computer Science & Information Technology

Any control ____________ should have a descriptive, programmer-defined name.

a. used in a form b. whose name appears in a programming statement c. that is a label d. with a text property

Computer Science & Information Technology