You create a named range by using the ________

Fill in the blank(s) with correct word

Name Box

Computer Science & Information Technology

You might also like to view...

Filters CANNOT be applied to collapsed lists

Indicate whether the statement is true or false.

Computer Science & Information Technology

What is the second step in the Security System Development Life Cycle?

A. Acquire/Develop B. Implement or Assess C. Operate/Maintain D. Dispose

Computer Science & Information Technology