The instructions for a recorded macro are written in the ________ for applications language

A) Visual Basic
B) Visual C#
C) Visual C++
D) Visual F#


A

Computer Science & Information Technology

You might also like to view...

Which of the following tools can be used to manually scan a system for vulnerabilities?

A) Ping B) Telnet C) Share Enum D) Oph Crack

Computer Science & Information Technology

Experts look at users' ________, which measures how long users actually spend on a site

A) circles B) wave ratings C) metadata D) engagement

Computer Science & Information Technology

David is creating  new database.  Discuss a pro and con of creating it from a predeveloped Access database template.

What will be an ideal response?

Computer Science & Information Technology

________ software helps you manage email, calendars, and tasks

a. Document management
b. Personal information management
c. Project management
d. Word processing

Computer Science & Information Technology