As you record the macro, Excel automatically translates each action into ____ that you can later view and modify.

A. default code
B. active code
C. program code
D. user code

Answer: C

Computer Science & Information Technology

You might also like to view...

_________ is a form of auditing that focuses on the security of an organization’s IT assets.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Why are use cases that describe boundary conditions described during system design (as opposed to during requirements elicitation or analysis)?

What will be an ideal response?

Computer Science & Information Technology