To approve or block files containing macros, your macro security level should be set to:

A) Enable all macros. B) Enable all macros without files.
C) Disable all macros with notification. D) Disable all macros without notification.


C

Computer Science & Information Technology

You might also like to view...

The requirement for ____ implies the need to develop a suitable set of standard metrics to underwrite the performance of the compliance process.

A. clarity B. correctness C. brevity D. accuracy

Computer Science & Information Technology

Create a movie of the robot (robot.jpg) moving across the moon (moon-surface.jpg).

What will be an ideal response?

Computer Science & Information Technology

________ view is often used as a basis for a table of contents or a PowerPoint summary

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of these is an Internet Explorer security feature that helps protect you from fraudulent websites that masquerade as legitimate sites and attempt to hijack your password and account information?

a. SmartScreen Filter b. Notification c. Digital signatures d. Protected Mode

Computer Science & Information Technology