ReymanChavez2004
ReymanChavez2004 ReymanChavez2004
  • 05-05-2021
  • Computers and Technology
contestada

Taran is concerned with the security of his macros in a database. Which security option could he use to provide protection?

digital signatures
hide database objects
start-up options
secure VBA code

Respuesta :

carissaestes979
carissaestes979 carissaestes979
  • 07-05-2021

Answer:security VBA code

Explanation:

Answer Link

Otras preguntas

2. What is the y-intercept for the equation -2 + 5y = -10? A) (0, 5) B) (0, -5) C) (0, 2) D) (0, -2)
Barbara Kingsolver establishes the style of the novel by using phrases like "ugly as a mud stick fence," "pie-faced heavy girl," "for-pay ironing," and "dresse
What is an example of speed?
Please help me with this question
What kind of logical fallacy is used in the following argument: My cousin's school just changed to a 6 a.m. start time, and everybody liked the change. That mea
hot coffee in a mug cools over time and the mug warms up . which describes the energy in the system
When is a graphing calculator preferable to finding the solutions to an equation?
Analyze the foot of the following word. submit A: Iambic B: trochaic
Which statement is true? A triangle can be congruent to a square. A rectangle can be congruent to a square. All circles are congruent. None of the above is true
the lengths of the sides of a certain triangle are 3,4 and 5 respectively what can you say about the triangle A- scalene B- isosceles C- equilateral D- equian