Security should be enabled on workbooks containing macros because they can be used to spread ________
Fill in the blank(s) with the appropriate word(s).
Answer: malware
You might also like to view...
. __________ is a form of software reuse in which a new class is created quickly and easily by absorbing an existing class’s members and customizing them with new or modified capabilities.
a) Interfacing b) Inheritance c) Encapsulating d) Polymorphism
_____ can be inserted from a file or imported directly from imaging devices.
A. Vector drawings B. Photographs C. Clip art D. Both photographs and clip art
Based on the dangling-else discussion , modify the following code to produce the output shown. Use proper indentation techniques. You must not make any additional changes other than inserting braces. We eliminated the indentation from the following code to make the problem more challenging
``` if (y == 8) if (x == 5) cout << "@@@@@" << endl; else cout << "#####" << endl; cout << "$$$$$" << endl; cout << "&&&&&" << endl; ``` Assuming x = 5 and y = 8, the following output is produced. ``` @@@@@ ```
Which of the following statements about UNIX processes is true?
a) The UNIX kernel allows user processes to modify PCBs as needed. b) UNIX processes are provided with a range of physical addresses in which to store its code, data and stack. c) The process table allows the operating system to access information regarding every process. d) all of the above