Security should be enabled on workbooks containing macros because they can be used to spread ________

Fill in the blank(s) with the appropriate word(s).

Answer: malware

Computer Science & Information Technology

You might also like to view...

In a database, the window used to create the object where data is stored is called the ________ window

A) Report Design B) Query Design C) Table Design D) Table Data View

Computer Science & Information Technology

When you pass an array or an individual array element of a reference type to a method, the called method receives ________. When you pass an individual element of a primitive type, the called method receives ________.

a. a copy of the element’s reference, a copy of the element’s reference b. a copy of the element’s value, a copy of the element’s reference c. a copy of the element’s value, a copy of the element’s value d. a copy of the element’s reference, a copy of the element’s value

Computer Science & Information Technology