Explain security concerns with macros and what can be done to minimize the risk

What will be an ideal response?


The sequence of commands that are automatically executed when a macro is run can contain harmful commands that can be used to collect, delete, or modify data in a database and often spread to other databases or onto the user's computer. Microsoft Access's TrustCenter contains settings that can help mitigate the risk of being a victim of a malicious macro virus. A trusted location can be defined, and nontrusted macros can be disabled.

Computer Science & Information Technology

You might also like to view...

Which type of SSIS package task permits the package to interact with other applications?

A. data flow B. scripting C. workflow D. maintenance

Computer Science & Information Technology

Assuming that strict two-phase locking is in use, describe how the actions of the two-phase commit protocol relate to the concurrency control actions of each individual server. How does distributed deadlock detection fit in?

What will be an ideal response?

Computer Science & Information Technology

The process of changing cells in a worksheet to see how those changes affect the outcome of formulas is known as ________

A) Formula AutoComplete B) What-if analysis C) General fund analysis D) Relative cell reference

Computer Science & Information Technology

FIGURE EX 1-1 To change the location of the Quick Access Toolbar, which command would you select on the menu shown in Figure EX 1-1 above?

A. Quick Print B. Sort Ascending C. Open D. Show Below the Ribbon

Computer Science & Information Technology