Security should be enabled on workbooks containing macros because they can be used to spread ________
Fill in the blank(s) with the appropriate word(s).
Answer: malware
Computer Science & Information Technology
You might also like to view...
In a database, the window used to create the object where data is stored is called the ________ window
A) Report Design B) Query Design C) Table Design D) Table Data View
Computer Science & Information Technology
When you pass an array or an individual array element of a reference type to a method, the called method receives ________. When you pass an individual element of a primitive type, the called method receives ________.
a. a copy of the element’s reference, a copy of the element’s reference b. a copy of the element’s value, a copy of the element’s reference c. a copy of the element’s value, a copy of the element’s value d. a copy of the element’s reference, a copy of the element’s value
Computer Science & Information Technology