1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iren [92.7K]
3 years ago
12

15 points. Please give an actual answer and not some random thing. this is not just free points. Correct answer will receive bra

inliest. Quinn is opening an Excel workbook and receives an information bar and warning that the workbook contains macros. Quinn is prompted to enable the macros. What should he do?
Close it immediately and delete the file.

Check where the file originates from, and if it is a trusted source or his own workbook, click Enable Content.

Close the file then right-click and rename it before opening it again.

Ignore the warning and click Enable Content because the file will not open without the macros enabled.
Computers and Technology
2 answers:
trapecia [35]3 years ago
7 0

Answer:

i think its b

Explanation:

i did the test and got it right

ZanzabumX [31]3 years ago
4 0

Answer:

Hello again.

Explanation:

The answer is B.

You might be interested in
A group known as ""Takedown"" hacked into your political action committee website and defaced it. Which type of threat actor is
natima [27]
<h2>Answer:</h2><h3>Hacktivist group is most likely to responsible for this.</h3><h3 /><h2>Explanation:</h2>

Hacktivism is defined as an action in which a computer or a network is targeted so that it could be misused in order to achieve a goal against any social or political action.

Hacktivists are the persons who perform hacktivism in order to seek attention on a specific thing or issue they want, from all the people.

In the given scenario, the hacking attack is hactivism as it is done to pull the company down.

Hacktivist can be a single person as well as a group of people working together. However they try to work anonymously so that they could not be traced.

<h3>I hope it will help you! </h3>
6 0
3 years ago
What will happen to the tools and equipment, if it is not store propely?​
nikklg [1K]
This question doesn’t make any sense I guess it will rust
8 0
3 years ago
Which of the following statements about Java Class Libraries is false? Question 18 options: A) An advantage of using Java class
Novosadov [1.4K]

Answer:

D) Java class libraries are not portable

Explanation:

The Java Class Library (JCL) is an array of enthusiastically loadable libraries that Java applications can identify and refer to at run time. Since the Java Platform is independent of any particular operating system, applications can’t depend on any of the platform-native libraries.

The library is a massive collection and works of prebuilt classes that is distributed through the Java SE platform.

6 0
3 years ago
How do you bookmark a website in each of the internet browsers?
vekshin1

Answer:

Following are the steps which are given below in the explanation part we will bookmark the website in the browser.

Explanation:

Following are the steps:

  • Open the internet web browser.
  • Press right click of the mouse in the empty portion of the web page or press the CTRL+D. After that select the Add to favorite option from there. There is a dialog box is appears on the web page filling the name of the bookmarks and press the add button on it.  

With the following steps, we will bookmark a website in internet browsers.

5 0
3 years ago
A n n sss eeeee rrrr
Nadusha1986 [10]

Usability emphasizes utility over aesthetics because in order for something to be useful it has to have a designated purpose. While aesthetics are nice they are not usable so the answer is B

4 0
4 years ago
Other questions:
  • For a line segment, show that clipping against the top of the clipping rectangle can be done independently of the clipping again
    7·1 answer
  • The command button to protect a document is part of the​.
    10·1 answer
  • the mail merge feature can be used to address the same letter to several different people , true or false
    13·2 answers
  • Why are duplicate tuples not allowed in a relation?
    6·1 answer
  • Components that enhance the computing experience, such as computer keyboards, speakers, and webcams, are known as
    7·1 answer
  • Rapunzel s-a născut într-un ţinut îndepărtat într-un regat necunoscut. Mama vitregă a închis-o pe Rapunzel într-un turn foarte î
    6·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    11·2 answers
  • What is the best definition of a network?
    14·2 answers
  • What is a trusted computing base (TCB)? Hosts on your network that support secure transmissions The operating system kernel and
    9·1 answer
  • Given a list of syntax errors from a compiler, a programmer should focus attention on which error(s), before recompiling?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!