enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Visual Basic for Applications - Wikipedia

    en.wikipedia.org/wiki/Visual_Basic_for_Applications

    As with any common programming language, VBA macros can be created with malicious intent. Using VBA, most of the security features lie in the hands of the user, not the author. The VBA host application options are accessible to the user. The user who runs any document containing VBA macros can preset the software with user preferences.

  3. Macro virus - Wikipedia

    en.wikipedia.org/wiki/Macro_virus

    A macro virus can be spread through e-mail attachments, removable media, networks and the Internet, and is notoriously difficult to detect. [1] A common way for a macro virus to infect a computer is by replacing normal macros with a virus. The macro virus replaces regular commands with the same name and runs when the command is selected.

  4. Microsoft Excel - Wikipedia

    en.wikipedia.org/wiki/Microsoft_Excel

    The Macro Recorder records actions of the user and generates VBA code in the form of a macro. These actions can then be repeated automatically by running the macro. The macros can also be linked to different trigger types like keyboard shortcuts, a command button or a graphic.

  5. Macro (computer science) - Wikipedia

    en.wikipedia.org/wiki/Macro_(computer_science)

    For example, the Racket language extends the notion of a macro system to a syntactic tower, where macros can be written in languages including macros, using hygiene to ensure that syntactic layers are distinct and allowing modules to export macros to other modules.

  6. Command pattern - Wikipedia

    en.wikipedia.org/wiki/Command_pattern

    For example, to undo a delete selection command, the object may contain a copy of the deleted text so that it can be re-inserted, if the delete selection command must be undone. Note that using a separate object for each invocation of a command is also an example of the chain of responsibility pattern. The term execute is also ambiguous.

  7. Macro recorder - Wikipedia

    en.wikipedia.org/wiki/Macro_recorder

    This can cause problems when trying to play back a macro if the user's desktop environment has changed. For example, if the user has changed their desktop resolution, moved icons, or moved the task bar, the mouse macro may not perform the way the user intended. That's one of the reasons for preferring keyboard macros over the mouse-oriented ones.

  8. Shell script - Wikipedia

    en.wikipedia.org/wiki/Shell_script

    A shell script can provide a convenient variation of a system command where special environment settings, command options, or post-processing apply automatically, but in a way that allows the new script to still act as a fully normal Unix command. One example would be to create a version of ls, the command to list files, giving it a shorter ...

  9. Macro key - Wikipedia

    en.wikipedia.org/wiki/Macro_key

    Macro key on an old keyboard. A macro key is a keyboard key that can be configured to perform custom, user-defined behavior. Many keyboards do not have a macro key, but some have one or more. Some consider a macro key to enhance productivity by allowing them to do operations via a single key press that otherwise requires slower or multiple UI ...