A ________ is a saved series of commands stored for later use

A) filter

B) macro

C) query

D) sort


B

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Asymmetric encryption utilizes only a public key for encryption and decryption. 2. Asymmetric encryption can be used for confidentiality but not for authentication. 3. Asymmetric encryption transforms plaintext into ciphertext. 4. Plaintext is transformed into ciphertext using two keys and a decryption algorithm. 5. A major advance in symmetric cryptography occurred with the development of the rotor encryption/decryption machine.

Computer Science & Information Technology

You can create a new symbol by using the ____ command on the Insert menu.

A. Add Symbol B. Insert Symbol C. New Symbol D. Save Symbol

Computer Science & Information Technology

? ? A. B. Referring to the figure above, the fact that the Web page width can vary means that this is an example of a ____ layout.

A. minimum B. maximum C. relative D. fluid

Computer Science & Information Technology

One way to create a table, is to click ____ on the Ribbon and then click the Table button.

A. New B. Create C. Add D. Insert Table

Computer Science & Information Technology