Macros that work with ""user interface"" objects, such as forms, reports, and buttons, are known as ________ macros.

Fill in the blank(s) with the appropriate word(s).


UI

Computer Science & Information Technology

You might also like to view...

An individual ____________________ calendar can be created for any task that does not follow the working and nonworking times specified by the project calendar.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The _____________ is the FSMO that holds the only writeable copy of the Active Directory schema

a. RID master b. PDC emulator c. Infrastructure master d. None of the above.

Computer Science & Information Technology

Which business practice is a technique initiated by top management that involves all employees and all departments and focuses on quality assurance in every product and service offered to customers?

A. BPM B. SDLC C. MRP D. TQM

Computer Science & Information Technology

Perimeter controls establish ____.

A. secure control B. defense-in-total C. controlled defense D. defense-in-depth

Computer Science & Information Technology