A(n) __________ is programming within an application that enables you to control aspects of the application, but can be used to harm systems if used in a malicious manner.
Fill in the blank(s) with the appropriate word(s).
macro
correct
Computer Science & Information Technology
You might also like to view...
Based on the fact statements provided, summarize the maintenance department’s most important strengths, weaknesses, opportunities, and threats.
What will be an ideal response?
Computer Science & Information Technology
Options such as font type, bold, and centering are possible when using the ________ format
Fill in the blank(s) with correct word
Computer Science & Information Technology
The _____, named after a nineteenth-century economist, is a widely used tool for visualizing issues that need attention and is drawn as a vertical bar graph.
A. Pareto chart B. Gantt chart C. Scatter chart D. XY chart
Computer Science & Information Technology
Which switch below can be added to thels command to show a list of files and their type?
A. -T B. -L C. -F D. -l
Computer Science & Information Technology