When you record a macro, Excel is actually converting your keystrokes and mouse clicks to ________ commands
Fill in the blank(s) with correct word
Visual Basic for Applications, VBA
Computer Science & Information Technology
You might also like to view...
________ threats are specifically designed to overcome prevention measures and seek the most vulnerable point of attack.
A. Human-caused B. Technical C. EMI D. Environmental
Computer Science & Information Technology
Which of the following is not an advantage of using a graphics tablet?
A. Multiple levels of pressure sensitivity B. The ability to move even faster than when you use shortcut keys C. Programmable menu buttons, touch strips, and a contoured grip pen D. A wider variety of brush tips and colors
Computer Science & Information Technology