Macros that can be used maliciously to erase or damage files are known as:

A) macro viruses. B) macro bugs. C) macro worms. D) VBA.


A

Computer Science & Information Technology

You might also like to view...

________ is the timing of the transition

A) Emphasis effect B) Entrance effect C) Timeline D) Transition speed

Computer Science & Information Technology

When debugging a Ruby program, you can use the ____ method to examine the value assigned to the program's local variables.

A. var local B. var variable C. show local D. show variable

Computer Science & Information Technology

Jurors should begin a case

A) With a clear opinion about the guilt or innocence of the defendant B) In a state of ignorance C) With a clear understanding of the laws at issue in the case D) Knowing all the facts that may be presented

Computer Science & Information Technology

What are the FRUs on a motherboard?

What will be an ideal response?

Computer Science & Information Technology