Unauthorized macro code is called a ________
A) virus code B) malicious code C) warning code D) macro virus
D
Computer Science & Information Technology
You might also like to view...
All of the following can be done in Skype EXCEPT ________
A) share files B) send instant messages C) share calendars D) make voice or video calls
Computer Science & Information Technology
What is attained when variable and method names are meaningful and when they represent the actual value they represent?
A. Understandability B. Maintainability C. Readability D. Flexibility
Computer Science & Information Technology