Which of the following macro security settings is ONLY to be used by developers?
A) Disable all macros without notification B) Disable all macros with notification
C) Trust access to the VBA project object model D) Enable all macros
C
You might also like to view...
Explain how Administrators use local user groups to simplify the management and authorization of network resources.
What will be an ideal response?
Consider an ATM system. Identify at least three different actors that interact with this system.
What will be an ideal response?
Match the following terms to their meanings:
I. Action button A. Displays when a linked object is clicked during a onscreen II. Hyperlink presentation III. Hidden slide B. Software to view and navigate the Web IV. URL C. A hyperlink created by using an AutoShape V. Browser D. A button, text, or image used to access additional information E. Web address
Which of the following is NOT a type of long-distance wireless two-way communication device?
A. Bluetooth B. CDMA C. 1Ganalog cellular phone D. 2G digital cell phone