Unauthorized macro code is called a:
A) warning code. B) malicious code. C) virus code. D) macro virus.
D
Computer Science & Information Technology
You might also like to view...
A CSS rule consists of two parts: the selector and the declaration.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A unique signal by a device to let the operating system know that it needs attention is called a(n) ________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The OSI ____ layer defines all electrical and physical specifications for devices.
A. network B. application C. data link D. physical
Computer Science & Information Technology
Which of the following is a streaming player for your TV that can use your home's wireless network to connect with online services such as Netflix and Pandora?
A. Spotify B. Glass C. OnLive D. Roku
Computer Science & Information Technology