When you record a macro, Excel is actually converting your keystrokes and mouse clicks to ________ commands

Fill in the blank(s) with correct word

Visual Basic for Applications, VBA

Computer Science & Information Technology

You might also like to view...

________ threats are specifically designed to overcome prevention measures and seek the most vulnerable point of attack.

A. Human-caused B. Technical C. EMI D. Environmental

Computer Science & Information Technology

Which of the following is not an advantage of using a graphics tablet?

A. Multiple levels of pressure sensitivity B. The ability to move even faster than when you use shortcut keys C. Programmable menu buttons, touch strips, and a contoured grip pen D. A wider variety of brush tips and colors

Computer Science & Information Technology