After a proposed change is accepted or rejected, which of the following if removed from the cell?

A) The changes B) The triangle
C) The tracking notation D) The cell's value

C

Computer Science & Information Technology

You might also like to view...

The current method of encrypting communication between a client and a server depends on a security protocol called _______.

A. RAT B. TLS C. PUP D. AES

Computer Science & Information Technology

By default, Excel copies formulas with ____________________ references.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology