1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
siniylev [52]
1 year ago
8

Use the VBA Editor to create a new module. Type the following VBA code to createa custom depreciation function (be sure to inclu

de the blank lines after the firstline and before the last line). Save and exit the VBA Editor.
Function Depreciation (Value, Rate)
Depreciation = Value * Rate
End Function
Computers and Technology
1 answer:
zalisa [80]1 year ago
5 0

Many Microsoft Access users are experienced with using macros to automate activities, but they are not knowledgeable with module code or the Visual Basic for Applications (VBA) programming language.

Many Microsoft Access users are experienced with using macros to automate activities, but they are not knowledgeable with module code or the Visual Basic for Applications (VBA) programming language.  All Microsoft Office products employ the VBA programming language. You can utilize it in Word documents, Excel spreadsheets, PowerPoint presentations, and Outlook in addition to Access. Additionally, Visual Basic 6's language and VBA's are highly similar. In actuality, the integrated development environment (IDE) and syntax editor are nearly identical.

The creation of macros is simple and involves selecting options from drop-down menus. It's simple to see the possibilities available after choosing an action and choose the best decision.

Know more about programming language:

brainly.com/question/23959041

#SPJ4

You might be interested in
What is the difference between cybercrime and cyber security?
Klio2033 [76]

Answer: Cybersecurity is ultimately about protecting government and corporate networks, seeking to make it difficult for hackers to find and exploit vulnerabilities. Cybercrime, on the other hand, tends to focus more on protecting individuals and families as they navigate online life.

Explanation:

3 0
3 years ago
PLEASEEEE THIS IS NEXT PERIOD ,,,,Software providers release software updates on a regular basis. However, most people feel that
pav-90 [236]

if you do not update a software the system will not work properly

4 0
3 years ago
Read 2 more answers
AND, NOT and OR are comparisons of values included in which type of operation?
Allushta [10]

Answer:

Comparison Operators

Explanation:

6 0
2 years ago
Read 2 more answers
What is
ratelena [41]
Hope this really helps u with your studies
225/80=2.8125m/s
7 0
3 years ago
In this project, you will add a (self-proclaimed) priority attribute to xv6 processes. The priority does not actually do anythin
kondor19780726 [428]

Answer:

Priority programming is a process programming method based on priority. In this technique, the developer chooses the tasks to work according to priority, which is different from other types of programming, for example, a simple round-robin.

On UNIX and many other systems, higher priority values represent lower priority processes. Some of the systems, such as Windows, use the opposite convention: a higher number means a higher priority

<h3>Explanation: </h3>

Priorities can be dynamic or static. Static priorities are assigned during creation, while dynamic priorities are assigned according to the behavior of the processes while they are in the system. To illustrate, the planner could favor intensive input / output (I / O) tasks, allowing expensive requests to be issued as soon as possible.

Priorities can be defined internally or externally. Internally defined priorities make use of a measurable amount to calculate the priority of a given process. On the contrary, external priorities are defined using criteria beyond the operating system (OS), which may include the importance of the process, the type and sum of the resources used for the use of the computer, user preferences , trade and other factors such as politics etc.

i hope this is right lol

6 0
3 years ago
Other questions:
  • ​________ establishes a connection between the​ computers, sequences the transfer of​ packets, and acknowledges the packets sent
    11·1 answer
  • How many degrees of freedom does any unconstrained object have in 3-D modeling?
    6·1 answer
  • Who are some of my emails not all deleting on my android i have to use my laptop to see them to delete them?
    12·2 answers
  • The bus width and bus speed together determine the bus's ______ or bandwidth; that is, the amount of data that can be transferre
    5·1 answer
  • Which careers have the highest minimum experience requirement?
    6·1 answer
  • Adding all the three primary colors-red, green, and blue-at maximum intensity produces the color _____, while adding any two of
    9·1 answer
  • Time complexity: Be sure to show your work. Suppose that a particular algorithm has time complexity T (n) = 10 ∗ 2n, and that ex
    7·1 answer
  • A network technician is designing a network for a small company. The network technician needs to implement an email server and w
    7·1 answer
  • May someone help me with the this question pls , The governor of a state wants to inform the people about a change in the tax po
    9·1 answer
  • Which transform function would you use to operate the filename values into two separate columns, one for the filename and the ot
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!