You can change macro security settings in the ________

A) Trust Center B) Options settings C) Visual Basic group D) Developer tab


A

Computer Science & Information Technology

You might also like to view...

The main grayscale technology for e-text display on the Amazon Kindle Paperwhite and Barnes and Noble NOOK is ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

If there is no primary key field, then the data is sorted ________

A) in the order in which it was entered into the table B) based on the foreign key C) alphabetically D) numerically

Computer Science & Information Technology

When using an append query, the ________ is the table from which records are being extracted

A) source table B) static data C) destination table D) extraction table

Computer Science & Information Technology

________ text files allocate a certain number of characters for each field

Fill in the blank(s) with correct word

Computer Science & Information Technology