In a new workbook, row headings are ________

A) numbers B) numbers and letters
C) letters D) symbols

A

Computer Science & Information Technology

You might also like to view...

All of the following are unwanted software a hacker could install on your computer, EXCEPT ________

A) keystroke loggers B) ghosts C) Trojan horses D) rootkits

Computer Science & Information Technology

What is the term used to specify that a class that is based on a prior class has access to the methods and properties of that other class?

a. Code reuse b. Divide and conquer c. Inheritance d. Parameter e. None of these

Computer Science & Information Technology