NOCTI 3
Across
- 2. a program that is designed to copy itself onto other software and to spread through multiple computers when the software is used is called a what
- 4. to resize a chart in a spreadsheet, the user can drag the what of the chart
- 5. in additions to detecting viruses and inoculating against them what programs can repair infected programs and files
- 7. an efficient way to complete 500 customers' personal invitations would be to create a what
- 9. which chart or graph best shows the relationship of a part to a whole
- 11. to balance the text in columns, insert a what section break
- 13. the y-axis scale on 3-D chart is derived from what in the worksheet
- 15. some employees have limited access to company information. this security is called what
- 17. to create a heading to span across two or more columns, the user should what
Down
- 1. a what restricts the information traveling into and out of a computer
- 3. a computer that has malicious software installed on it that can be controlled by a master computer is called a what
- 6. text design, such as drop capitals and graphics embedded with watermarks, are both forms of what when using desktop publishing
- 8. preset margins, tabs, line spacing, and fonts are called what settings
- 10. a what is a device that makes decisions about what network path packets should follow
- 12. to reverse an action or its effect in a spreadsheet, the user should select the what command
- 14. a company that want to tie various remote locations together would implement a what
- 16. the wireless encryption of what is the weakest encryption used