1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
siniylev [52]
1 year ago
8

Use the VBA Editor to create a new module. Type the following VBA code to createa custom depreciation function (be sure to inclu

de the blank lines after the firstline and before the last line). Save and exit the VBA Editor.
Function Depreciation (Value, Rate)
Depreciation = Value * Rate
End Function
Computers and Technology
1 answer:
zalisa [80]1 year ago
5 0

Many Microsoft Access users are experienced with using macros to automate activities, but they are not knowledgeable with module code or the Visual Basic for Applications (VBA) programming language.

Many Microsoft Access users are experienced with using macros to automate activities, but they are not knowledgeable with module code or the Visual Basic for Applications (VBA) programming language.  All Microsoft Office products employ the VBA programming language. You can utilize it in Word documents, Excel spreadsheets, PowerPoint presentations, and Outlook in addition to Access. Additionally, Visual Basic 6's language and VBA's are highly similar. In actuality, the integrated development environment (IDE) and syntax editor are nearly identical.

The creation of macros is simple and involves selecting options from drop-down menus. It's simple to see the possibilities available after choosing an action and choose the best decision.

Know more about programming language:

brainly.com/question/23959041

#SPJ4

You might be interested in
How do i show all emails from same sender in outlook
OverLord2011 [107]

Your just gonna have to scroll through all of them until you find the right one or search for some key words.

4 0
3 years ago
Read 2 more answers
The virus scanning technique that uses rules to determine if a program behaves like a virus is _________ scanning.
andrew-mc [135]

Answer:

Option c: Heuristic

Explanation:

Heuristic scanning is a form of computer virus detection analysis that screen for the suspicious characteristic of the program which maybe a virus. Heuristic scanning is designed to detect those new computer virus, unknown virus or the modified version of the known virus.

To perform heuristic scanning, a weigh-based evaluation algorithm will be adopted to estimate the likelihood of the current scanned program behaves like a virus which can pose a computer threat. If it exceeds a threshold level, an alarm will be triggered.

3 0
3 years ago
What is the small window that pops up in a application that requieres a response for the user
Marina CMI [18]

Answer:

that is called a popup box. or a alert box

assuming you are talking about this

3 0
3 years ago
Read 2 more answers
The base fine is $35.0 and the hourly rate is $10.0 per hour. The parking meter is in minutes and it is rounded up to hours for
mr_godi [17]

Answer:$45

Explanation:I am assuming it has been an hour? $35 base fine and $10 for hourly rate.

5 0
4 years ago
A machine’s ability to mimic human thinking to behave in a way that appears to be learning and solving problems is known as:
kkurt [141]

D. game mechanics D. game mechanics

7 0
3 years ago
Other questions:
  • The search engine that makes it easy to find high-quality Web resources by combining Internet technology with traditional librar
    9·1 answer
  • To prevent class objects from being copied or assigned, you can:
    8·1 answer
  • The inner planets are called terrestrial because they
    11·2 answers
  • When a linke chain contain nodes that reference both the next node and the previous node it is called a(n)
    6·1 answer
  • What is the default file extension for a document created in Word 2016?​
    14·1 answer
  • Write code to complete PrintFactorial()'s recursive case. Sample output if userVal is 5:5! = 5 * 4 * 3 * 2 * 1 = 120
    11·1 answer
  • You are planning the requirements for a site tracking and reporting system for your company Web site. Which of the following inf
    10·1 answer
  • IPv6 is being developed in order to:
    15·1 answer
  • the penalties for ignoring the requirements for protecting classified information when using social networking services are ____
    12·1 answer
  • Practising some questions for board exams for class 12 python,pls help with detailed answer
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!