A(n) __________ is programming within an application that enables you to control aspects of the application, but can be used to harm systems if used in a malicious manner.

Fill in the blank(s) with the appropriate word(s).


macro

correct

Computer Science & Information Technology

You might also like to view...

Based on the fact statements provided, summarize the maintenance department’s most important strengths, weaknesses, opportunities, and threats.

What will be an ideal response?

Computer Science & Information Technology

Options such as font type, bold, and centering are possible when using the ________ format

Fill in the blank(s) with correct word

Computer Science & Information Technology

The _____, named after a nineteenth-century economist, is a widely used tool for visualizing issues that need attention and is drawn as a vertical bar graph.

A. Pareto chart B. Gantt chart C. Scatter chart D. XY chart

Computer Science & Information Technology

Which switch below can be added to thels command to show a list of files and their type?

A. -T B. -L C. -F D. -l

Computer Science & Information Technology