Unauthorized macro code is called a:

A) warning code. B) malicious code. C) virus code. D) macro virus.


D

Computer Science & Information Technology

You might also like to view...

A CSS rule consists of two parts: the selector and the declaration.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A unique signal by a device to let the operating system know that it needs attention is called a(n) ________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The OSI ____ layer defines all electrical and physical specifications for devices.

A. network B. application C. data link D. physical

Computer Science & Information Technology

Which of the following is a streaming player for your TV that can use your home's wireless network to connect with online services such as Netflix and Pandora?

A. Spotify B. Glass C. OnLive D. Roku

Computer Science & Information Technology