If the location where a file is stored is not known to the Excel Trust Center as a trusted location, the Trust Center will block all of the following that could contain malicious code EXCEPT:

A) macros B) scripts C) controls D) formulas

D

Computer Science & Information Technology

You might also like to view...

Which of the following is not one of the disadvantages of using the “copy-and-paste” approach to duplicating code from one class into another class?

a. Errors are prone to be spread around. b. It is time consuming. c. It forces the system to store many physical copies of the code, creating a code-maintenance nightmare. d. All of the above are disadvantages of the “copy-and-paste” approach.

Computer Science & Information Technology

Answer the following questions true (T) or false (F)

1. The String class is a mutable class. 2. To use a package, the program must contain an import statement that names the package.

Computer Science & Information Technology