What formula auditing tool can be used to control the data input from the user?

A) Trace dependents B) Watch Window C) IFERROR D) Data validation

D

Computer Science & Information Technology

You might also like to view...

____ often exploit well-known security vulnerabilities in popular software to spread destructive programs such as viruses, worms, and Trojan horses.

A. Maskers B. Hackers C. Stoppers D. Networkers

Computer Science & Information Technology

The Timing panel is used to control when animated objects play.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology