Cell references in a formula are called ____.
A. assumptions
B. values
C. numbers
D. content
Answer: A
Computer Science & Information Technology
You might also like to view...
Word templates are available on your computer and online
Indicate whether the statement is true or false
Computer Science & Information Technology
Which is an operational process performed by AWS for data security?
A. AES-256 encryption of data stored on any shared storage device B. Decommissioning of storage devices using industry-standard practices C. Background virus scans of EBS volumes and EBS snapshots D. Replication of data across multiple AWS Regions E. Secure wiping of EBS data when an EBS volume is unmounted
Computer Science & Information Technology