Which of the following items is not stored inside VBA modules?

A. Sub procedures
B. Keywords
C. Index documents
D. Comments

Answer: C

Computer Science & Information Technology

You might also like to view...

A cryptographic nonce is important for confirming that a party is active and fully participating in a protocol exchange. One reason attackers can succeed with many web-page attacks is that it is relatively easy to craft authentic-looking pages that spoof actual sites. Suggest a technique by which a user can be assured that a page is both live and authentic from a particular site. That is, design

a mark, data interchange, or some other device that shows the authenticity of a web page. What will be an ideal response?

Computer Science & Information Technology

To remove a text-shadow, set the value of the text-shadow style to ____.

A. 0 B. none C. 1 D. empty

Computer Science & Information Technology