1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arada [10]
3 years ago
15

Ted knows that macros can be helpful to him in his work with Excel spreadsheets,but he also knows they have their hazards,so he

comes to you for guidance about what kind of security settings he should put in place,and at what times.
-While just getting his feet wet with Excel,you suggest to Ted that he might want to begin without having his installation of Excel have any macros run at all.Which of the following options would he select in the Trust Center?

A) Disable all macros without notification
B) Cancel all macros
C) Disable a macro with notification
D) Disable all macros except digitally signed macros
Computers and Technology
1 answer:
laila [671]3 years ago
3 0

Answer:

Hhhhhhhhjjjffhkvs4hjtth

Explanation:

H*jhfujttjhfhjfhhdtjdgndrjgr7kvykngimg6

You might be interested in
What is internal storage device
Assoli18 [71]
Something like a hard drive.
5 0
3 years ago
Look at the picture lol
andrey2020 [161]

Answer:

Zoom in more please and than i can help

Explanation:

6 0
2 years ago
Read 2 more answers
Is MongoDB open source?
s2008m [1.1K]

Answer:

Yes

Explanation:

Check MongoDB on Github and you will see that it is open source.

7 0
3 years ago
Given the code as follows: main() { int i = 3, n; float x; x = i; n = 8 % x; } What problem will occur? Group of answer choices
Bess [88]

Answer:

A compilation error will occur.

Explanation:

The % operator does not accept a float as its right-hand operand.

7 0
2 years ago
What feature allows you to access previous copies of a document on OneDrive?
swat32
<span>C) Stored work

I hope this helps :)
</span>
4 0
3 years ago
Read 2 more answers
Other questions:
  • Over time, attackers have had to increase their skills to be able to attack systems or create viruses. True False
    8·1 answer
  • Why is linux referred to as open source software?
    6·1 answer
  • Which is a value of the Scrum Manifesto?
    9·1 answer
  • A popular encryption method used to protect data that travel over a wireless network is ___
    15·1 answer
  • CHALLENGE 7.1.1: Initialize a list. ACTIVITY Initialize the list short.names with strings 'Gus', Bob, and 'Ann'. Sample output f
    9·1 answer
  • Which among the following choices is correct based on the two statements listed below? Statement 1: When the lexical analyzer sc
    12·1 answer
  • To enforce the concept of separating class definition from its function implementations, where should the function implementatio
    14·1 answer
  • Is megan the stallion hot
    13·2 answers
  • What is the output for the following code?<br><br> print (5*4+5)
    11·1 answer
  • You have a filtered dataset for Customer Sales with some null value rows. You want to remove these rows completely. How will you
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!