A set of instructions in Visual Basic for Applicaitons that accomplishes a specific task is called a(n) ________

Fill in the blank(s) with correct word

sub procedure

Computer Science & Information Technology

You might also like to view...

Which of the following is not true about computer crime?

a. Spyware is software that can collect your personal information, monitor your Web surfing habits, and then distribute this information to a third party. b. Identity theft is one of the fastest growing crimes in the United States and the United Kingdom. c. Malware is a general term that describes software designed to damage or infiltrate a computer system without the owner's consent or knowledge. d. In a phishing attack, a "phisher" poses as a legitimate company, like a bank or credit agency, in an e-mail or on a Web site in an attempt to obtain personal information

Computer Science & Information Technology

What protocol uses port numbers 67 and 68?

A. DHCP B. DNS C. HTTP D. FTP

Computer Science & Information Technology