What formula auditing tool can be used to control the data input from the user?
A) Trace dependents B) Watch Window C) IFERROR D) Data validation
D
Computer Science & Information Technology
You might also like to view...
____ often exploit well-known security vulnerabilities in popular software to spread destructive programs such as viruses, worms, and Trojan horses.
A. Maskers B. Hackers C. Stoppers D. Networkers
Computer Science & Information Technology
The Timing panel is used to control when animated objects play.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology