An unauthorized programming code in a macro that erases or damages files is called a macro ________

Fill in the blank(s) with correct word


virus

Computer Science & Information Technology

You might also like to view...

Which of the following codes uses 16 bits to represent characters?

A. Unicode B. ASCII C. Extended ASCII D. Binary

Computer Science & Information Technology

What class does the Integer class inherit from?

What will be an ideal response?

Computer Science & Information Technology

When using to the Internet, most home users are concerned with ________

A) checking e-mail B) channel supports C) the download speed D) shopping

Computer Science & Information Technology

What special address is used for the IPv6 loopback?

A) ::7F00:0001 B) 1:: C) ::1 D) 7F00:0001::

Computer Science & Information Technology