A list of active add-ins can be viewed in the ________
A) Data tab B) View tab
C) Scenario Dialog box D) Add-Ins Dialog box
D
You might also like to view...
Which of the following allows a malicious attacker to view network traffic if the attacker is on the same network segment as Joe, an administrator?
A. DoS attack B. Man-in-the-middle attack C. Smurf attack D. Xmas attack
A technician installs and tests a new program on a computer using an administrative account. When a user runs the program, it fails to keep configuration changes the user makes. Which of the following is the MOST likely cause of the problem?
A. The user has inadequate training in the use of the program. B. The software requires the user to be an administrator. C. The network share permission is not set properly for the computer. D. The user account does not have read permissions to the folder.