In ciphertext-only.
EXPLANATION: it is an attack model for cryptanalysis where the attacker is assumed to have access only to a set of ciphertexts. The attack is completely successful if the corresponding plaintexts can be extracted or, even better, the key.
✓ adding rows
✓ adding columns
✓ deleting rows
✓ deleting columns
✓ changing column width
✓ aligning tables
✓ converting tables to text
✓ converting tables to graphs
Believe it or not, all of these actions are possible in MS Word.
Generally its referring to the cells location, so C.