1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
myrzilka [38]
3 years ago
6

Quinn is opening an Excel workbook and receives an information bar and warning that the workbook contains macros. Quinn is promp

ted to enable the macros. What should he do?
Computers and Technology
2 answers:
Andrew [12]3 years ago
4 0

Answer:

Check where the file originates from, and if it is a trusted source or his own workbook, click Enable Content.

Explanation:

faltersainse [42]3 years ago
4 0

Answer:

B. Check where the file originates from, and if it is a trusted source or his own workbook, click Enable Content.

Explanation:

Edg. 2021

You might be interested in
The Internet may best be compared to a/an
Usimov [2.4K]
A volcano because its always erupting
3 0
3 years ago
The larget social networking site to date is
maks197457 [2]
FB, I would guess.

Sincerely,

Xeno
3 0
3 years ago
What is responsible for what u see on a computer monitor?
zhuklara [117]
What is responsible or who is responsible?
3 0
4 years ago
Which of the following best describes compounds.
Lemur [1.5K]
A. They can only be separate chemically
4 0
3 years ago
What's good computing?
cestrela7 [59]

Answer:

1.Use passwords that can't be easily guessed, and protect your passwords.

2.Minimize storage of sensitive information.

3.Beware of scams.

4.Protect information when using the Internet and email.

5.Make sure your computer is protected with anti-virus and all necessary 6.security "patches" and updates.

7.Secure laptop computers and mobile devices at all times: Lock them up or carry them with you.

8.Shut down, lock, log off, or put your computer and other devices to sleep before leaving them unattended, and make sure they require a secure password to start up or wake-up.

9.Don't install or download unknown or unsolicited programs/apps.

Secure your area before leaving it unattended.

10.Make backup copies of files or data you are not willing to lose.

Explanation:

7 0
2 years ago
Other questions:
  • Open source software is copyrighted software that is distributed at no cost for a trial period.
    11·1 answer
  • Select the correct answer.
    8·1 answer
  • _____ remove the part of an image starting from an edge​
    13·1 answer
  • Which button would you use to insert a downloaded video clip on your computer into a slide?
    15·2 answers
  • How did punch cards improve the weaving process?
    11·1 answer
  • Cotización de un software
    12·1 answer
  • To control how and when the slides should appear during the slide show, we use the__________________ feature​
    12·1 answer
  • The {blank} view is the working window of a presentation.
    15·2 answers
  • Which activity is performed during high-level design in the V-model?
    9·1 answer
  • 1. (A) What do you mean by computer? Discuss the use of<br> computer in daily life.
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!