1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
siniylev [52]
10 months ago
8

Use the VBA Editor to create a new module. Type the following VBA code to createa custom depreciation function (be sure to inclu

de the blank lines after the firstline and before the last line). Save and exit the VBA Editor.
Function Depreciation (Value, Rate)
Depreciation = Value * Rate
End Function
Computers and Technology
1 answer:
zalisa [80]10 months ago
5 0

Many Microsoft Access users are experienced with using macros to automate activities, but they are not knowledgeable with module code or the Visual Basic for Applications (VBA) programming language.

Many Microsoft Access users are experienced with using macros to automate activities, but they are not knowledgeable with module code or the Visual Basic for Applications (VBA) programming language.  All Microsoft Office products employ the VBA programming language. You can utilize it in Word documents, Excel spreadsheets, PowerPoint presentations, and Outlook in addition to Access. Additionally, Visual Basic 6's language and VBA's are highly similar. In actuality, the integrated development environment (IDE) and syntax editor are nearly identical.

The creation of macros is simple and involves selecting options from drop-down menus. It's simple to see the possibilities available after choosing an action and choose the best decision.

Know more about programming language:

brainly.com/question/23959041

#SPJ4

You might be interested in
If you have related data stored in multiple tables, create a(n) ________ to produce a pivottable on the combined data.
vladimir1956 [14]
If you have related data stored in multiple tables, create a Data model to<span> produce a pivot table on the combined data.
In computer term, data model refers to how each data are connected to one another and how those connections are being processed within the Sysyem</span>
3 0
3 years ago
A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To ac
Vikentia [17]

Answer:

input-year taken 2020

2020 is divisible by 2

output- 2020 is a leap year

3 0
2 years ago
A reason to overload the ________ is to write classes that have array-like behaviors. parentheses ( ) operator curly braces { }
Georgia [21]

Answer:

square brackets [ ] operator

Explanation:

<h2><u>Multiple choice</u></h2>

A reason to overload the<u> square brackets [ ] operator </u> is to write classes that have array-like behaviors

5 0
2 years ago
You need to back up the existing data on a computer before you install a new application. You also need to ensure that you are a
nevsk [136]

Answer:

Backup and restore console should be utilized in that scenario.

Explanation:

4 0
3 years ago
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
vovikov84 [41]

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

5 0
3 years ago
Other questions:
  • A password checking system that disallows user passwords that are proper names or words that are normally included in a dictiona
    15·1 answer
  • _____ is when network managers deal with network breakdowns and immediate problems instead of performing tasks according to a we
    9·1 answer
  • What does software alone enable a computer to do? connect to the Internet control processing speeds interact with the user manag
    11·2 answers
  • Determine the output of the following code segment:
    9·1 answer
  • Rick needs to find the lowest number in a set of numbers that includes decimals. Which statistical function in a spreadsheet wil
    9·2 answers
  • Why is the keyboard calledQWERTY
    5·2 answers
  • (1) Prompt the user for a string that contains two strings separated by a comma. (1 pt) Examples of strings that can be accepted
    13·1 answer
  • A network administrator determines who may access network resources by assigning users
    10·1 answer
  • Identify the correct answer in each item. Write your answer on the blank provided before
    13·1 answer
  • There are some games that cannot be described by a single--or even two-- genres. Can you think of any that should be invented?​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!