After a proposed change is accepted or rejected, which of the following if removed from the cell?
A) The changes B) The triangle
C) The tracking notation D) The cell's value
C
Computer Science & Information Technology
You might also like to view...
The current method of encrypting communication between a client and a server depends on a security protocol called _______.
A. RAT B. TLS C. PUP D. AES
Computer Science & Information Technology
By default, Excel copies formulas with ____________________ references.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology