A series of actions that can be programmed to automate tasks.
What will be an ideal response?
Macro
Computer Science & Information Technology
You might also like to view...
What are the network adapter hardware requirements for a Hyper-V cluster?
What will be an ideal response?
Computer Science & Information Technology
Why is labeling data flow diagrams so important? What can effective labels on data flow diagrams accomplish for those unfamiliar with the system?
What will be an ideal response?
Computer Science & Information Technology
Which of the following actions will be taken when a port security violation takes place with the protect option enabled?
A) Offending traffic is discarded. B) Log and SNMP messages are sent. C) The violation counter is incremented. D) The interface is disabled.
Computer Science & Information Technology
Which type of database arranges links in a tree structure?
a. Hierarchical database b. Network database c. Relational database d. Object-oriented database
Computer Science & Information Technology