To distinguish each macro added to a(n) ____, you must give the macro a unique name.

A. Action Argument
B. macro
C. Action
D. macro group


Answer: D

Computer Science & Information Technology

You might also like to view...

Match the following investigative objectives to their proper chain of custody practices

I. Document the activities A. Verify the integrity of the copy to the source II. Authenticate the copy B. Ensure fairness in the evaluation III. Acquire the evidence C. Create a copy without altering the original IV. Be objective and unbiased D. Keep detailed records and photographs V. Analyze and filter the evidence E. Perform the technical analysis while retaining its integrity

Computer Science & Information Technology

Use _________ for punctuating the United States national anthem, the Star Spangled Banner.?

A. ?italics B. ?quotation marks

Computer Science & Information Technology

How can you determine who is in charge of an investigation?

What will be an ideal response?

Computer Science & Information Technology

When a field has no value—a value that is unknown or unavailable or just missing—it is called a ____ value.

A. zero B. void C. null D. hidden

Computer Science & Information Technology