You can separate words in a macro name by using the ____ character

Answers

Answer 1
You can separate words in a macro name by using the underscore character.

A macro is considered as a small reusable computer program. It is efficient as it helps you save time by automating any repeated task.
In order to create a macro, you do not need to be an expert in programming, however, a little knowledge about it will help.

Answer 2

A macro is a fragment of code which has been given a name. The name of a macro is a unique string that begins with a letter or a @, #, $, _ symbol. You can separate words in a macro name by using the underscore character. This character tells  that the current statement isn't finished yet and it continues on the next line. So, it's used to split a single line of code over two lines.


Related Questions

A virtual meeting is the same thing as a/an A. online meeting. B. VoIP. C. seminar. D. convention.

Answers

Answer:

a developer forum

Explanation:

Inkjet printers and laser printers are examples of ________ printers.

Answers

inkjet printers and laser printers are examples of NON-IMPACT printers.

"the most common way to access the internet is through ________."

Answers

The most common was is your phone

What to do when the tool bar for paint tool sai dissapears?

Answers

Click windows on the top of the SAI screen. Click the checks until you find what you're looking for.

The technology (software) that automatically downloads website information to your computer is called ________.'

Answers

a malicious program that repeatedly copies itself into a computer's memory .... the authoring language used to create documents on the World Wide Web. ... an interconnected system of internet computers(called servers) that support specially ..... software that automatically downloads information to personal computers.

How does the network layer use the mtu value?

Answers

The MTU is passed to the network layer by the data link layer. The standard Ethernet MTU value is 1500 bytes.

Liz will use a CD-R compact disk to write to more than once. Carlo will use a CD-RW compact disk to write to more than once. Who is using the correct disk for its purpose? 

       A. Only Carlo is correct.   B. Neither Carlo nor Liz is correct.   C. Both Carlo and Liz are correct.   D. Only Liz is correct.

Answers

A. Only Carlo is correct.

CD-R drives once burned cannot be reused, however CD-RW can be rewritten for up to 1000 times.

What computer system was the first to run the unix operating system?

Answers

The Digital Equipment Corporation PDP-7 system was the first to run Unix as an operating system in 1969. Ken Thompson wrote the operating system on this computer. The PDP-7 is an 18-bit mini computer, first developed in 1965. This computer was considered inexpensive yet powerful at its time of development.

Horizontal scaling of client/server architecture means _____.

Answers

Horizontal scaling of client/server architecture means that more machines or more client workstation are added in the network. The impact on the network should be small and negligible. 
Vertical scaling on the other hand means that more power (processing units) are added in the network. 

In order to use the commit command in oracle, you need to clear the check mark from the ____ check box.​

Answers

In order to use the commit command in oracle, you need to clear the check mark from the autocommit check box. The commit command is the transactional command used to save changes invoked by a transaction to the database and autocommit is the default transaction mode in Oracle and commits each action query as soon as the user executes the query.​

What kind of device is a cpu input or output?

Answers

Correct answer: Neither

The CPU is also known as the processor or microprocessor. The CPU is responsible for executing a sequence of stored instructions called a program. This program will take inputs from an input device, process the input in some way and output the results to an output device. It is neither an input nor an output device, but it is usually connected to both kinds of devices.

Output devices like your monitor, speaker, and printer does not process anything fo it to be categorized as a processing device like your CPU and so as input devices like your mouse, microphone, and keyboard.

âwhat service uses a private cloud in conjunction with a web browser or downloaded client software to access desktop software?

Answers

The answer should be: Virtual Desktop Infrastructure

A user reports that his macine will no longer boot properly. after asking several questions to determine the problem, you suspect the user unknowingly downloaded malware from the internet, and that the malware has infected the system

Answers

A malware is a software the capable to damage or disable computer programs. The user must reimage the machine or reprogram the system. It can be also boot from Windows installation and use the recovery environment to run a startup repair.

Give one advantage and two disadvantages of using a wireless network

Answers

an advantage would be that you wouldn't  have to try to get cables from everywhere but the disadvantages are that you would loose internet while walking and you would have unstable internet. I'm sorry if I'm wrong

In which osi model layer does tcp operate?

Answers

In which OSI  model layer does TCP operate?
The TCP/IP stack has only 4 layers vs 7 of the OSI model.
1 Link & Physical
2 Internetworking
3 Transport 
4 Application 
TCP/UDP operates on the Internetworking layer
IP/ICPMand IGMP work on the Transport layer

Having reviewed dod wireless stig (ver6, release 1), sarah learns she may only utilize secnet 54 and ______________ for transmitting classified information up to top secret.

Answers

Sarah learns she may only utilize SecNet 54 and SecNet 11 for transmitting classified information up to top secret.

SecNet 11 Plus is a family of encrypted 802.11b wi-fi networking products. The Army has also approved SecNet 11 as part of the classified Navy Marine Corps Intranet (NMCI) wireless solution. There are many products in SecNet 11 family, such as SecNet 11 Plus PC card, the SecNet 11 Wireless ridge, and the SecNet 11 Key Fill Cable etc.

If your BAL is .10 you can expect a _______ drop in complex performance compared to the sober level

Answers

36% is the answer to your question.

Find an element inside a div using javascript

Answers

You want to find it based on what? Here's a solution if you want to find it based on id:

function GetElementInsideContainer(containerID, childID) {
   var elm = document.getElementById(childID);
   var parent = elm ? elm.parentNode : {};
   return (parent.id && parent.id === containerID) ? elm : {};
}

Voip uses ________ technology similar to email to transmit voice over the internet. digital

Answers

The answer to this question is Digital technology.

Digital technology refers to the software and hardware that are used in our homes, schools, and offices which are evolving. Digital technologies are electronic tools like online games, social media, and mobile devices. Digital technology comprises of electronics like fast computers, portable devices, and networks with higher connections.

If a webpage utilizes two css files - style.css and media-queries.css, which should be linked last in the head section?

Answers

media-queries.css should be linked last, the same as if your media queries were in the same file (always go last)

You can select a noncontiguous range of cells by pressing and holding the ________ key when using it in combination with other navigation keys and/or the mouse

Answers

Hey there!

I believe your answer will be the "Shift" key. You can hold down Shift and select a cell from your current cell position to select everything between the original position and the cell you clicked on without having to drag your mouse across the cells. If you were to hold down the Ctrl or Command key, you would only have your original selection and your new selection highlighted. 

Your answer will be Shift. 

Hope this helped you out! :-)

What is the name of the interface that uses graphics as compared to a command-driven interface?

Answers

Answer = GUI (Graphical User Interface)

When entering a formula or function into a cell, most spreadsheet programs require that you begin with some type of symbol, usually the asterisk character (*)?

Answers

This is a false statement, if that's the question.

Which version of windows server 2008 must computer be running to create a failover cluster?

Answers

windows 7 had this problem

To extend the bottom border of a hyperlink across the complete width of a navigation list, change the ____ property of each hyperlink to block.

Answers

Change the display property of each hyperlink to block.

The interface should communicate the status of any activity initiated by the user is what type of interface design principle?

Answers

Answer: User-friendly

You are boating on a lake. the weather turns bad. what should all passengers do first?

Answers

Answer:

Wear your life jackets

Explanation:

If you foresee bad weather, the best thing to do is to slow the boat down. Close all doors and windows. Stow all unnecessary equipment.

However, once inside the bad weather. The best thing to do is to wear your life jacket and make sure it is equipped properly. For any reason, you may fall overboard, the life jacket will help you stay afloat. Life jackets typically come equipped with lights and whistles. This would be vital for you to find fellow passengers. And vice versa, of course.

While boating on a lake and the weather suddenly turns bad, quickly advice all passengers to put on their life-jacket.

What is a life-jacket?

A life-jacket is a type of life saving jacket just as the name implies. It is used to suspend the individual that is wearing it on the surface of deep waters.

While traveling by a boat or carrying out a leisurely activity using a boat the following precautions needs to be taken:

Always put on the life-jacket while boating.

Always check the life-jackets to ensure its in good condition before boating

Always check for updates concerning the weather forecast to avoid boating in bad weather.

Therefore, while boating on a lake and the weather suddenly turns bad, quickly advise all passengers to put on their life-jacket.

Learn more about life-jackets here:

https://brainly.com/question/13447405

Which is the common name for a program that has no useful purpose, but attempts to spread itself to other systems and often damages resources on the systems where it is found?

Answers

its know as a virus (a program created to spread and maliciously harm computers)

In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.

Answers

2.4GHz Wireless Network

For security reasons a network administrator needs to ensure that local computers cannot ping each other. which settings can accomplish this task?

Answers

The administrator of the network can access the admin settings on the network's primary DNS servers. From there, there are hundreds of various settings and changes to make. There is one, however, that is able to disable pings. This will prevent computers from responding to ping requests. This can help to ensure internal security and reduce internal network traffic.

Final answer:

To prevent local computers from pinging each other, a network administrator can adjust the firewall settings to block ICMP Echo Requests, either on individual computers or network devices.

Explanation:

To prevent local computers from pinging each other on a network, a network administrator can configure the firewall settings on each computer. By setting up inbound and outbound rules, they can block Internet Control Message Protocol (ICMP) requests, which are used by the ping command. Specifically, the administrator would need to block ICMP Echo Requests to stop computers from responding to pings. Depending on the network's complexity, this can be done either individually on each computer, through a group policy in a Windows domain environment, or on a central network device like a router or firewall that governs the local network traffic. By implementing these firewall settings, local computers will not be able to ping each other, thus enhancing security on the network.

Other Questions
$10,000 is invested at two different rates. $2,500 is invested at 4%, and the rest is invested at 5%. How much interest is earned at the end of one year? Show all work for full credit. Simplify the expression sin^2x-1/cos(-x) PLEASE HURRY!! 25 POINTSChoose the statement that best answers this question: Cmo te llamas?A)Mucho gusto.B)Me llamo Juan.C)Buenas noches.D)Te llamas Juan. match each equation with the graphs What did american leaders learn at kasserine pass in north africa? The term __________ means abnormally increased muscle function or activity. Individuals belonging to the subculture known for love of motorbikes and leather. Rival of the group known as mods. How does Alcoholics Anonymous help people deal with alcoholism?It holds meetings where alcoholics and their family members can gather and discuss how alcoholism affects their lives.It encourages alcoholics to commit themselves to sobriety by sharing their past experiences and future goals.It focuses on alcoholism as a physical disease, instead of a mental problem that can be cured with the right treatment.NextReset What time period do children celebrate when they dress up in the regional costume and play regional games? 500 CE 11th century 1860s June 6 Entering an intersection before you can safely cross through it, and blocking it: Over the weekend, Statton and Tyler drove to Montana to go hunting. Now they're preparing to go home. Tyler needs gas for his jeep, which gets 22 miles per gallon for gas mileage. When he stops at the gas station, he already has 5 gallons of gas in his tank. he buys more gas for $1.25 per gallon if Tyler spends 22 on gas what is the total distance the boys could travel round if necessary to the nearest tenth A lab found that 670 rats could run through a maze in a mean time of 4.7 seconds. What is the 99% confidence interval for the population mean? Use the formula for margin of error: z/n. Please explain each step, particularly how to find the population standard deviation. a nutrition label indicates that one serving of apple crisp oatmeal has 2.5 grams of fat. how many grams of fat . how many grams of fat how many grams of fat arew there in 3.75 sevings? Software on the nas handles features such as data storage, file access, and file and storage management. true or false True or false to calculate the wave speed of a wave square the amplitude of the wave Find the area of the following shape. A(-5,-8) B(1,-8) C(3,-5) D(1,0) E(-5,-3) F(-3,-6). You must show work to receive credit. Given cos B = 11/18 find angle B in degrees. Round your answer to the nearest hundredth. 8.76 10 6 istimesthan 8.76 10 2 . A circuit contains three resistors connected in parallel. The value of R1 is 2 K , the value or R2 is 6 K , and the value of R3 is 10 K . If the supplied voltage is 100 VDC, what is the total power in the circuit? A. 2.18 W B. 8.18 W C. 7.67 W D. 4.24 W Write the equation is logarithmic form33 = 27A. log 27 = 3B. log327=27C. log327 = 3D. log 27 = 3 3 Steam Workshop Downloader