You create a named range by using the ________
Fill in the blank(s) with correct word
Name Box
Computer Science & Information Technology
You might also like to view...
Filters CANNOT be applied to collapsed lists
Indicate whether the statement is true or false.
Computer Science & Information Technology
What is the second step in the Security System Development Life Cycle?
A. Acquire/Develop B. Implement or Assess C. Operate/Maintain D. Dispose
Computer Science & Information Technology