What are the default names of worksheets?
A) 1, 2, 3, etc. B) Worksheet1, Worksheet2, etc.
C) Sheet1, Sheet2, etc. D) Excel 1, Excel 2, etc.
C
Computer Science & Information Technology
You might also like to view...
A security administrator is observing congestion on the firewall interfaces and a high number of half open incoming connections from different external IP addresses. Which of the following attack types is underway?
A. Cross-site scripting B. SPIM C. Client-side D. DDoS
Computer Science & Information Technology
____ is the process of performing a comprehensive search on the possible solution space by throwing all computational power an attacker can gather at breaking the system.
A. Brute force B. Dictionary attack C. Meet-in-the-middle D. Man-in-the-middle
Computer Science & Information Technology