Explain security concerns with macros and what can be done to minimize the risk

What will be an ideal response?

The sequence of commands that are automatically executed when a macro is run can contain harmful commands that can be used to collect, delete, or modify data in a database and often spread to other databases or onto the user's computer. Microsoft Access's TrustCenter contains settings that can help mitigate the risk of being a victim of a malicious macro virus. A trusted location can be defined, and nontrusted macros can be disabled.

Computer Science & Information Technology

You might also like to view...

New memory has been installed into a PC. The PC fails to POST after the memory is installed. The manufacturers website states that the motherboard supports the new memory. Which of the following may resolve the problem?

A. Upgrade to a compatible processor B. Configure the memory parity C. Update the BIOS D. Upgrade the operating system

Computer Science & Information Technology

Why would you choose an external SSD instead of an internal drive?

A) It is faster. B) No internal bays are available. C) It is less expensive. D) You need a higher storage capacity.

Computer Science & Information Technology