A subprocedure is created using the ________

A) Procedure Editor B) Visual Basic Creator
C) Visual Basic Editor D) Procedure Creator

C

Computer Science & Information Technology

You might also like to view...

Your organization collects several security metrics on a daily, weekly, and monthly basis. However, you determine that no one has been paying any attention to the metrics. You meet with management to discuss security metrics. What should you mention regarding these metrics?

A. They provide information on both short- and long-term trends. B. They provide information on only short-term trends. C. They provide information on only long-term trends. D. They are not needed as part of your organization's security policies.

Computer Science & Information Technology

__________ is the process of converting an original message into a form that is unreadable to unauthorized individuals.

A. Encryption B. Decryption C. Cryptology D. Cryptography

Computer Science & Information Technology