When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Visual Basic for Applications - Wikipedia

    en.wikipedia.org/wiki/Visual_Basic_for_Applications

    As with any common programming language, VBA macros can be created with malicious intent. Using VBA, most of the security features lie in the hands of the user, not the author. The VBA host application options are accessible to the user. The user who runs any document containing VBA macros can preset the software with user preferences.

  3. Microsoft Excel - Wikipedia

    en.wikipedia.org/wiki/Microsoft_Excel

    Microsoft Excel is a spreadsheet editor developed by Microsoft for Windows, macOS, Android, iOS and iPadOS.It features calculation or computation capabilities, graphing tools, pivot tables, and a macro programming language called Visual Basic for Applications (VBA).

  4. Macro virus - Wikipedia

    en.wikipedia.org/wiki/Macro_virus

    A macro virus can be spread through e-mail attachments, removable media, networks and the Internet, and is notoriously difficult to detect. [1] A common way for a macro virus to infect a computer is by replacing normal macros with a virus. The macro virus replaces regular commands with the same name and runs when the command is selected.

  5. Multiplan - Wikipedia

    en.wikipedia.org/wiki/Multiplan

    Multiplan floppy disk for Macintosh. Multiplan is a spreadsheet program developed by Microsoft and introduced in 1982 as a competitor to VisiCalc.. Multiplan was released first for computers running CP/M; it was developed using a Microsoft proprietary p-code C compiler [1] as part of a portability strategy that facilitated ports to systems such as MS-DOS, Xenix, Commodore 64 and 128, TI-99/4A ...

  6. Lotus 1-2-3 - Wikipedia

    en.wikipedia.org/wiki/Lotus_1-2-3

    Macros in version one and add-ins (introduced in version 2.0) contributed much to 1-2-3's popularity, allowing dozens of outside vendors to sell macro packages and add-ins ranging from dedicated financial worksheets like F9 to full-fledged word processors. In the single-tasking MS-DOS, 1-2-3 was sometimes used as a complete office suite. All ...

  7. Macro (computer science) - Wikipedia

    en.wikipedia.org/wiki/Macro_(computer_science)

    Applications (notably compilers) written in these machine-independent macros can then be run without change on any computer equipped with the rudimentary macro compiler. The first application run in such a context is a more sophisticated and powerful macro compiler, written in the machine-independent macro language. This macro compiler is ...

  8. Microsoft Access - Wikipedia

    en.wikipedia.org/wiki/Microsoft_Access

    The runtime version allows users to view, edit and delete data, along with running queries, forms, reports, macros and VBA module code. The runtime version does not allow users to change the design of Microsoft Access tables, queries, forms, reports, macros or module code.

  9. Microsoft Office 2010 - Wikipedia

    en.wikipedia.org/wiki/Microsoft_Office_2010

    When a document is opened in Protected View, users are allowed to view, copy, and paste the contents of the document, but there are no options to edit, save, or print contents, and all active document content including ActiveX controls, database connections, hyperlinks, and macros is disabled. [112]