As you record the macro, Excel automatically translates each action into ____ that you can later view and modify.
A. default code
B. active code
C. program code
D. user code
Answer: C
Computer Science & Information Technology
You might also like to view...
_________ is a form of auditing that focuses on the security of an organization’s IT assets.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Why are use cases that describe boundary conditions described during system design (as opposed to during requirements elicitation or analysis)?
What will be an ideal response?
Computer Science & Information Technology