Identify the letter of the choice that best matches the phrase or definition.

A. A procedure that performs operations, returns a value, accepts input values, and can be used in expressions.
B. A named location in computer memory that can contain a value.
C. A state, condition, or occurrence that Access recognizes.
D. Occurs when a VBA statement violates the language rules for the statement.
E. A VBA instruction.
F. A statement that serves as the starting point for a block of statements in a procedure.
G. Occurs when the procedure produces incorrect results.
H. Specifies how an object responds when the event occurs.
I. An action that operates on specific objects or controls.
J. A set of VBA statements that work together as a unit.
K. A procedure that performs operations and accepts input values, but does not return a value and cannot be used in expressions.
L. A group of statements created using VBA code.


A. function
B. variable
C. event
D. syntax error
E. statement
F. line label
G. logic error
H. event property
I. method
J. control structure
K. subroutine
L. procedure

Computer Science & Information Technology

You might also like to view...

To create a variable that is an array, you drag the array. . . control into the editing area.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When a higher-priority thread enters the ready state, the operating system generally preempts the currently running thread (an operation known as preemptive scheduling). Depending on the operating system, a steady influx of higher-priority threads could postpone—possibly indefinitely—the execution of lower-priority threads. such indefinite postponement is sometimes referred to more colorfully as________.

a. fasting b. famine c. starvation d. malnourishment

Computer Science & Information Technology

If multiple mathematical operands are included in a function or formula, Excel processes the calculations based on the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Select the security tool that is an inventory of applications and associated components that have been pre-approved and authorized to be active and present on the device?

A. malware management B. inventory permissions C. application whitelist D. application control

Computer Science & Information Technology