Besides an embedded macro, what is the other type of macro?

A) Included B) Stand-alone C) Inserted D) Automated


B

Computer Science & Information Technology

You might also like to view...

What is the result after evaluating the following expression: 24 MOD 9

a. 6 b. 3 c. 2 d. 5

Computer Science & Information Technology

A(n) _____ workstation loads its software from a server and would most likely be found being used by big corporations

Fill in the blank(s) with correct word

Computer Science & Information Technology

What expression describes the act of calling an event method?

A. cascading the event B. calling the event C. invoking the event D. composing the event

Computer Science & Information Technology

An attacker types more data in a field than the programmer expected. This is a(n) ________ attack

A. buffer overflow B. denial-of-service C. directory traversal D. XSS

Computer Science & Information Technology