________ worksheets from intentional or unintentional modification can be done by simply hiding the worksheets in the Excel workbook
Fill in the blank(s) with correct word
Protecting
Computer Science & Information Technology
You might also like to view...
A _________ is an individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account.
A) clandestine user B) superuser C) masquerader D) misfeasor
Computer Science & Information Technology
On the Windows ____, you can double-click a file icon to open a file.
A. Start menu B. desktop C. application D. folder
Computer Science & Information Technology