1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ioda
2 years ago
12

A malicious actor is preparing a script to run with an excel spreadsheet as soon as the target opens the file. the script includ

es a few macros designed to secretly gather and send information to a remote server. how is the malicious actor accomplishing this task
Computers and Technology
1 answer:
professor190 [17]2 years ago
5 0

Thay is the malicious actor accomplishing this task is done by using the VBA code.

<h3>What is The Visual Basic button?</h3>

It opens the Visual Basic Editor, in which you create and edit VBA code. Another button at the Developer tab in Word and Excel is the Record Macro button, which robotically generates VBA code that could reproduce the moves which you carry out withinside the application.

To run VBA withinside the “Microsoft Visual Basic for Applications” window, you could simply press “F5” key button or click on the “Run” icon withinside the toolbar.

Read more about the spreadsheet :

brainly.com/question/26919847

#SPJ1

You might be interested in
Why does brainly say im in highschool when im in middle school?
kati45 [8]

Answer:

brainly say You are in highschool when you are middle school because this app has drink alcohol

6 0
3 years ago
Read 2 more answers
Which object event is an indication that something has been created but not committed into the database?
ollegr [7]

Answer:

before update

Explanation:

because the update has been made but not submited

8 0
3 years ago
What does it mean to say that a graph is complete?
melisa1 [442]

Explanation:

The statement which says that a graph is complete means an undirected graph whose every pair of vertices is connected by an particular edge or unique edge.

An undirected graph is a graph whose edges soea not contain any direction means to which vertex they are directed.

A complete graph has an edge between every pair of vertices that exist in that graph.

3 0
3 years ago
Calculate the addition and multiplication of N integers numbers read from the keyboard
Viefleur [7K]
F,ELSE,FR,D,WHLE I think this is the correct answer. your quiestion is really confusing. also please make me the brainiest and correct me if im wrong.
6 0
3 years ago
Draw the hierarchy chart and then plan the logic for a program that calculates a person’s body mass index (BMI).
dusya [7]

Explanation:

I have attached the answer as an image. I can't upload the file as it requires a licensed product and I only used demo version. I can provide the file too if you can give me your vlsig file required to use full software. However, If you just copy along the images on your Visual Studio, you will easily create the files yourself. Answer is provided for both scenarios as part A and part B, one which stops after 1 iteration and the one which loops until 0 height is given.

8 0
3 years ago
Other questions:
  • Your bank offers to lend you $114,400 at an 8.5% annual interest rate to start your new business. The terms require you to amort
    11·1 answer
  • You are boating on a lake. the weather turns bad. what should all passengers do first?
    14·2 answers
  • How can you best protect yoursel and when using social media
    14·2 answers
  • All waves consist of a continuous series of _____.
    11·2 answers
  • How do you get points without answering questions i need the points for my math D:
    5·2 answers
  • Technology offers a variety of rich opportunities available to teachers and students. According to Inan and Lowther (2010), ther
    6·1 answer
  • Which of the following is an example of batch processing?
    14·1 answer
  • What is meant by normalization? Occurs when an intrusion detection system labels normal activity as anomalous. The process of tr
    5·1 answer
  • How to tell if your cell phone is being tracked tapped or monitored by spy software?
    12·1 answer
  • Which of the following safety and privacy features is not included in a P2P app or service?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!