A(n) ________ is a series of actions that can be programmed to automate tasks.

Fill in the blank(s) with the appropriate word(s).


macro

Computer Science & Information Technology

You might also like to view...

A __________ is a dedicated computer that interfaces with computers outside a network and has special security precautions built into it in order to protect sensitive files on computers within the network.

A) firewall B) ACL C) matrix D) guard

Computer Science & Information Technology

In the early days of computing, a ________ was an individual that possessed advanced skills, often making a computer do something that it wasn't originally intended to do.

A. hacktivist B. rogue C. hacker D. cyberterrorist

Computer Science & Information Technology

Write an algebraic expression for the statement given below. Let represent the unknown quantity. 3 less than six times a number.

What will be an ideal response?

Computer Science & Information Technology

Security implementation involves four complementary courses of action: prevention, detection, response, and _________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology