The instructions for a recorded macro are written in the ________ for applications language
A) Visual Basic
B) Visual C#
C) Visual C++
D) Visual F#
A
Computer Science & Information Technology
You might also like to view...
Which of the following tools can be used to manually scan a system for vulnerabilities?
A) Ping B) Telnet C) Share Enum D) Oph Crack
Computer Science & Information Technology
Experts look at users' ________, which measures how long users actually spend on a site
A) circles B) wave ratings C) metadata D) engagement
Computer Science & Information Technology
David is creating new database. Discuss a pro and con of creating it from a predeveloped Access database template.
What will be an ideal response?
Computer Science & Information Technology
________ software helps you manage email, calendars, and tasks
a. Document management
b. Personal information management
c. Project management
d. Word processing
Computer Science & Information Technology