A15:B22 is an example of a(n) ________
A) cell address
B) cell
C) range
D) citation
C
Computer Science & Information Technology
You might also like to view...
Which of the following types of identity theft/fraud is defined as the use of stolen personal and financial information to facilitate the creation of fraudulent accounts?
a. virtual identity theft/fraud b. criminal record identity theft/fraud c. theft for employment and/or border entry d. credit identity theft/fraud
Computer Science & Information Technology
Files saved as JPEG images have the file extension ____.
A. .jpe B. .jp C. .peg D. .jpg
Computer Science & Information Technology