An unauthorized programming code in a macro that erases or damages files is called a macro ________
Fill in the blank(s) with correct word
virus
Computer Science & Information Technology
You might also like to view...
Which of the following codes uses 16 bits to represent characters?
A. Unicode B. ASCII C. Extended ASCII D. Binary
Computer Science & Information Technology
What class does the Integer class inherit from?
What will be an ideal response?
Computer Science & Information Technology
When using to the Internet, most home users are concerned with ________
A) checking e-mail B) channel supports C) the download speed D) shopping
Computer Science & Information Technology
What special address is used for the IPv6 loopback?
A) ::7F00:0001 B) 1:: C) ::1 D) 7F00:0001::
Computer Science & Information Technology