What is involved in creating a macro

Assignment Help Basic Computer Science
Reference no: EM131399845

Class Discussion - Evaluating Macro Use As administrative assistant for the president of a local marketing company, you spend much of your time using application software, such as Word, Excel, Outlook, and Access. Your manager asked you to evaluate the use of macros to automate some of the repetitive tasks in the word processing work you do. Discuss two examples of common repetitive tasks in word processing that are not already available via buttons or commands. Include in your discussion the definition of a macro, how a macro automates a routine, what is involved in creating a macro, and how to invoke a macro.

Reference no: EM131399845

Questions Cloud

Write essay about story boys and girls : Need an essay about this story ''boys and girls'' of Alice Munro
Which would you recommend for your company : Which is easier to implement, systems implemented in a procedural language or an object-oriented language? Why? Which would you recommend for your company?
Investing into a biometric system : Is there a need to perform a risk assessment before investing into a biometric system?
Ethics case studies for health information management : Answer the discussion questions located at the end of the case you selected.Include what therapeutic approach you would apply in this case, and explain why you chose it.Describe the ethical issues you may encounter, as well as how you intend to appro..
What is involved in creating a macro : Include in your discussion the definition of a macro, how a macro automates a routine, what is involved in creating a macro, and how to invoke a macro.
Provide a brief overview of the health care organization : Provide a brief overview of the health care organization that you have selected for your Senior Project including a summary of the challenges and/or opportunities impacting the balance between health care costs and quality.
Bidding on a system design project : Your company is bidding on a system design project. It is your job to design the system architecture. How will you balance the need for scalability against the need to keep costs as low as possible to win the bid?
How should a networker create a personalized message : How can a sender's background information be verified? When is sharing contact lists considered appropriate? Summarize the information you read and viewed.
How the activity addresses the characteristics of ell level : Include a rationale of 250 words citing at least one scholarly source for each domain that describes how the activity addresses the characteristics of the ELL level and accounts for language acquisition theoretical principles.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Consider a lagrangian l

Consider a Lagrangian L that depends only on the magnitude of the velocity q(t ) of a particle which moves in ordinary three-di mensional space.

  Prove that all nonempty subsets of a frequent itemset

A partitioning variation of Apriori subdivides the transactions of a database D into n nonoverlapping partitions. Prove that any itemset that is frequent in D must be frequent in at least one partition of D.

  Assignment-apple versus samsun

Apple iPads continue to be successful. The Samsung Galaxy Tab is one (1) of iPad's competitors. Use the Internet and Strayer Library to research the advantages and disadvantages of these devices and to determine if they are comparable.

  Challenges of information vandalism and copyright

Do you agree or disagree with Professor Goldman's argument? What can Wikipedia do to combat the challenges of information vandalism and copyright/plagiarism issues?

  Write a program that generates a random integer

Write a program that generates a random integer in the (inclusive) range [0-9] (i.e. the set {0,1,2,3,4,5,6,7,8,9}) and ask the user to guess what the number is .

  Client health-care facilities-information-gathering process

shoulde patients in client health-care facilities participate in the information-gathering process? if so,why , and in what ways should they participate?

  What is the impulse response of the bandpass filter

What is the major problem with the frequency translation method for transforming a prototype lowpass filter into a bandpass filter?

  Why is segmented paging important

Why is segmented paging important (as compared to a paging system)? What are the different pieces of the virtual address in a segmented paging?

  Write and test a function that prints an error message

Write and test a function that prints an error message in the following format.

  Indicates that the student id is abc54301

Indicates that the student ID is ABC54301 and the answer to question 1 is  True, the answer to question 2 is False, and so on. This student did not  answer question 9. The exam has 20 questions, and the class has more than  150 students. Each corre..

  Why the three-way handshake is a security threat

Comment on the rapid growth of the Internet as a contributing factor to the security threat of cyberspace. What is the responsible factor in this growth? Is it people or the number of computers?

  Describe three elements of risk

Choose between a private corporation, government entity, or University and describe three elements of risk that you feel need to be managed on a day-to-day basis. Be sure to define why risk management needs to be in place and what countermeasures ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd