The person responsible to ensure every member is compliant with ethical rules is the ____________ ________________.  (Topic 2)
	Rows, columns, cells, formula bars, and workbooks and all ar…
Rows, columns, cells, formula bars, and workbooks and all are parts of a  ____________________ program.  (Topic 6)              
	________ _____________ providers are companies that provide…
________ _____________ providers are companies that provide users access to the World Wide Web. (Topic 4)
	Federal courts have established a system for electronic fili…
Federal courts have established a system for electronic filing called __________ ___________ /________  ________ ___________  (CM/ECF). (Topic 4)
	_____________ computer databases are very powerful tool, cap…
_____________ computer databases are very powerful tool, capable of performing complex searches and calculations. (Topic 7)
	A ____________ can be entered or changed by typing it in the…
A ____________ can be entered or changed by typing it in the property bar or typing it in a cell or by selecting the cell. (Topic 6)
	When a file is saved, a file _____________ is added to the…
When a file is saved, a file _____________  is added to the end of the file name to identify the format in which the file has been saved. (Topic 5)
	____________ are programs designed to limit access to a comp…
____________ are programs designed to limit access to a computer or computer networked system.   (Topic 3)                                
	The______ ________ is a method for transmitting a large file…
The______ ________ is a method for transmitting a large file in a compressed format.  (Topic 4)  
	When choosing a secure ________________, it should include a…
When choosing a secure ________________, it should include a combination of letters, numbers, and symbols. (Topic 3)