A15:B22 is an example of a(n) ________

A) cell address

B) cell

C) range

D) citation

C

Computer Science & Information Technology

You might also like to view...

Which of the following types of identity theft/fraud is defined as the use of stolen personal and financial information to facilitate the creation of fraudulent accounts?

a. virtual identity theft/fraud b. criminal record identity theft/fraud c. theft for employment and/or border entry d. credit identity theft/fraud

Computer Science & Information Technology

Files saved as JPEG images have the file extension ____.

A. .jpe B. .jp C. .peg D. .jpg

Computer Science & Information Technology