________ worksheets from intentional or unintentional modification can be done by simply hiding the worksheets in the Excel workbook

Fill in the blank(s) with correct word

Protecting

Computer Science & Information Technology

You might also like to view...

A _________ is an individual who is not authorized to use the computer and who penetrates a system’s access controls to exploit a legitimate user’s account.

A) clandestine user B) superuser C) masquerader D) misfeasor

Computer Science & Information Technology

On the Windows ____, you can double-click a file icon to open a file.

A. Start menu B. desktop C. application D. folder

Computer Science & Information Technology