In a new workbook, row headings are ________
A) numbers B) numbers and letters
C) letters D) symbols
A
Computer Science & Information Technology
You might also like to view...
All of the following are unwanted software a hacker could install on your computer, EXCEPT ________
A) keystroke loggers B) ghosts C) Trojan horses D) rootkits
Computer Science & Information Technology
What is the term used to specify that a class that is based on a prior class has access to the methods and properties of that other class?
a. Code reuse b. Divide and conquer c. Inheritance d. Parameter e. None of these
Computer Science & Information Technology