Unauthorized macro code is called a ________

A) virus code B) malicious code C) warning code D) macro virus

D

Computer Science & Information Technology

You might also like to view...

All of the following can be done in Skype EXCEPT ________

A) share files B) send instant messages C) share calendars D) make voice or video calls

Computer Science & Information Technology

What is attained when variable and method names are meaningful and when they represent the actual value they represent?

A. Understandability B. Maintainability C. Readability D. Flexibility

Computer Science & Information Technology