What are the default names of worksheets?

A) 1, 2, 3, etc. B) Worksheet1, Worksheet2, etc.
C) Sheet1, Sheet2, etc. D) Excel 1, Excel 2, etc.

C

Computer Science & Information Technology

You might also like to view...

A security administrator is observing congestion on the firewall interfaces and a high number of half open incoming connections from different external IP addresses. Which of the following attack types is underway?

A. Cross-site scripting B. SPIM C. Client-side D. DDoS

Computer Science & Information Technology

____ is the process of performing a comprehensive search on the possible solution space by throwing all computational power an attacker can gather at breaking the system.

A. Brute force B. Dictionary attack C. Meet-in-the-middle D. Man-in-the-middle

Computer Science & Information Technology