1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gizmo_the_mogwai [7]
3 years ago
6

What steps will change an existing macro? Use the drop-down menu to complete the steps.

Computers and Technology
2 answers:
Aneli [31]3 years ago
6 0

Answer:

1. View

2. View macros

3. Edit

Explanation: completed on edge

faust18 [17]3 years ago
6 0

Answer:

view

view macros

edit

Explanation:

You might be interested in
In the context of intentional computer and network threats a ____ is a programming routine built into a system by its designer
lara31 [8.8K]

Answer:

a. backdoor

backdoor (also called a trapdoor) is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

6 0
3 years ago
Read 2 more answers
List the main industries in Sierra Leone​
Dafna11 [192]

Answer:

The main industries in Sierra Leone are: Diamond mining

Petroleum refining

Small - scale manufacturing (beverage, textiles,footwear)

Explanation:

They also engage in commercial ship repair

3 0
3 years ago
using a for loop, write a program that prints out the decimal equivalents of 1/2, 1/3, 1/4,..., 1/10.
ValentinkaMS [17]
In python:

##Specifies the range that the variable 'number' should change within
for number in range(2,10):
##Prints the decimal equivalent of each fraction
    print(1 / number)
5 0
3 years ago
Each time a user logs on locally, the ____ database is used to verify logon credentials. sam ssid sid nid
NNADVOKAT [17]
<span><span>Each time the user logs on locally, the SSID database is used to verify logon credentials.

Service Set Identifier (SSID), which is attached to the headers of packets that are transmitted over Wireless Local Area Network or W-LAN is a unique identifier. It contains a total of 32 characters. The alphanumeric identifier is case sensitive.</span></span>
6 0
3 years ago
To construct a battery with a current of 6 A, you would connect six 1 A cells
m_a_m_a [10]
A. in parallel.,<span>D. in series.</span>
6 0
3 years ago
Read 2 more answers
Other questions:
  • . If you have written the following source code:
    9·1 answer
  • Today when Dylan turned on his computer, he noticed that the monitor was very dim. He could still see the desktop icon and text.
    15·1 answer
  • What are the advantages of using an external style sheet?
    9·1 answer
  • Using the same Apple ID for multiple devices will definitely sync them all together <br> True/False
    7·2 answers
  • Software project management is the process planning, organizing, and monitoring of the development of a software project from it
    15·1 answer
  • Select all the correct answers.
    6·1 answer
  • An employee is working on building a new computer application for a friend. For this purpose, he uses the software that is regis
    5·1 answer
  • Write a python program to calculate the sum of three numbers and as well require the user to input the numbers.​
    12·1 answer
  • When you're writing for mobile devices, use ________ to present the most important information first and provide successive laye
    13·1 answer
  • Lab: even/odd values in an array
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!