A set of instructions in Visual Basic for Applicaitons that accomplishes a specific task is called a(n) ________
Fill in the blank(s) with correct word
sub procedure
You might also like to view...
Which of the following is not true about computer crime?
a. Spyware is software that can collect your personal information, monitor your Web surfing habits, and then distribute this information to a third party. b. Identity theft is one of the fastest growing crimes in the United States and the United Kingdom. c. Malware is a general term that describes software designed to damage or infiltrate a computer system without the owner's consent or knowledge. d. In a phishing attack, a "phisher" poses as a legitimate company, like a bank or credit agency, in an e-mail or on a Web site in an attempt to obtain personal information
What protocol uses port numbers 67 and 68?
A. DHCP B. DNS C. HTTP D. FTP