A(n) ________ is used to provide explanatory information about the macro or the action

A) condition
B) command
C) argument
D) comment


D

Computer Science & Information Technology

You might also like to view...

A(n) ____________________ lets you record information about people.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The file that contains code written by the programmer is the ____.

A. Application file B. Executable file C. Object file D. Source file E. Text file

Computer Science & Information Technology

________ techniques include creating viruses and worms, performing denial-of-service (DoS) attacks as well as establishing unauthorized remote access connections to a device using Trojans/backdoors, creating botnets, packet sniffing, phishing, and password cracking.

A. Personal-hacking B. Network-hacking C. Server-hacking D. Intelligence-hacking

Computer Science & Information Technology

An administrator needs to back up files from a server to the cloud. The administrator must select the most efficient type of backup technology that will update file changes the fastest and utilize the least amount of bandwidth. Which of the following backup technologies should the administrator select?

A. File-level backups B. Block-level backups C. Snapshot-level backups D. Folder-level backups

Computer Science & Information Technology