Cell references in a formula are called ____.

A. assumptions
B. values
C. numbers
D. content

Answer: A

Computer Science & Information Technology

You might also like to view...

Word templates are available on your computer and online

Indicate whether the statement is true or false

Computer Science & Information Technology

Which is an operational process performed by AWS for data security?

A. AES-256 encryption of data stored on any shared storage device B. Decommissioning of storage devices using industry-standard practices C. Background virus scans of EBS volumes and EBS snapshots D. Replication of data across multiple AWS Regions E. Secure wiping of EBS data when an EBS volume is unmounted

Computer Science & Information Technology