1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blsea [12.9K]
2 years ago
15

There are four ways to create a macro? FALSE OR TRUE

Computers and Technology
2 answers:
Murljashka [212]2 years ago
7 0

Answer: True

Explanation:

There are actually four ways to create a macro. You would want to use %let.

Sidana [21]2 years ago
5 0
Answer:

There are five ways to create a macro. (False)




You might be interested in
If you were doing a regular expression inside a Linux command line, which special character on the keyboard would give you two p
Murrr4er [49]

Answer: car | truck

Explanation: The pipe (|) symbol used can be used in regular expression to simply imply OR. This means when used in between expression, can be used to search for all matches of the strings in which it stands in between. In the scenario above, If the pipe symbol is located in between the two strings, such as [ cars | trucks], the expression returns possible occurrence of the strings cars and trucks. It may also be used to locate and return the occurrences of more than 2 strings, such as; string1 | string2 | string3

6 0
3 years ago
Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and ins
Murljashka [212]

Since Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and the kind of attack is known to be Downgrade attack.

<h3>What is downgrade security attack?</h3>

A downgrade attack is known  to be a kind of of cyber attack that is made up of the fact that an attacker is known to often forces a network channel to make a switch to a kind of an unprotected or one that is said to be less secure data transmission standard.

Note also that the  Downgrading of a given protocol version is said to be a key element of  a type of a  man-in-the-middle attacks, and it is known to be one that is often used to take or hijack encrypted traffic.

Hence, Since Basil was reading about a new attack that forces the system to abandon a higher cryptographic security mode of operation and the kind of attack is known to be Downgrade attack

Learn more about Downgrade attack from

brainly.com/question/24304791

#SPJ1

3 0
2 years ago
Consider a physical transmission medium of capacity C bits/sec between two stations that have I bits of information sent/receive
levacccp [35]

Answer:

Check the explanation

Explanation:

when calculating the total time to send the I bits of information or The packet delivery time or latency which can be said to be the amount of time from when the first bit leaves the point of transmission until the last is received. When it comes to a physical link, it can be computed or determined as: Packet delivery time = Transmission time + Propagation delay.

Kindly check the attached image below to get the step by step explanation to the above question.

5 0
3 years ago
It is considered good practice to save a presentation before printing it. true false
Ilya [14]
It is true because it is really a good practise to save a presentation before printing it

5 0
3 years ago
Answers please !!!!!!!!!!!!!!!!!!!!!!!!!!!
alina1380 [7]
Hard to see please add a better image. Actually just type out the question.
4 0
4 years ago
Other questions:
  • Which computer port transmits audio and video without the need for compression?
    6·1 answer
  • is a specific system for gathering information from a single group of respondents by continuously monitoring the advertising, pr
    13·1 answer
  • What is the output of the second println statement in the main method? public class Foo { int i; static int s; public static voi
    14·1 answer
  • What are the three default security levels within software restriction policies?
    12·1 answer
  • What task does the casting director do, apart from auditioning actors?
    8·1 answer
  • People using commercially available software are usually asked to read and agree to a(n) _____
    10·1 answer
  • Jane receives an email claiming that her bank account information has been lost and that she needs to click a link to update the
    13·1 answer
  • A photographer uses which of these tools to form an argument?
    14·2 answers
  • sandra has houseplants sitting on her kitchen windowsill, where it receives a lot of sunlight . what will most likely be the pla
    9·2 answers
  • Why do you want to work from our company?​
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!