Match each feature with the tab used to access the feature:
I. Create a table
II. Add a row to a table
III. Create a caption
IV. Create envelope labels
V. Design a table border
A. Table Tools Layout
B. References
C. Mailings
D. Insert
E. Table Tools Design
D, A, B, C, E
You might also like to view...
Each of the following statements is TRUE about working with multiple workbooks EXCEPT:
A) Working with multiple workbooks is very similar to working with multiple worksheets. B) Excel 2013 opens each workbook in the same window. C) Data can be referenced between workbooks using 3-D ranges and formulas, so when the source workbook is updated, the changes flow through to the summary workbook. D) Users can choose whether or not to link workbooks to make the updating automatic or not.
The _________ attack is when the attacker is looking for two messages M and M1 that produce the same hash: H(M) = H(M1)
A. birthday B. chaining C. MAC D. hash