1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vitek1552 [10]
3 years ago
9

What kind of table is a pasted Word table that can be edited with Word from within PowerPoint without changing the data in your

source file?
A. Embedded
B. Inserted
C. Linked
D. Integrated
Computers and Technology
2 answers:
igomit [66]3 years ago
7 0

D. Integrated

Or

A. Embedded

Marianna [84]3 years ago
4 0

Answer:

Embedded

Explanation:

Embedded table is a pasted Word table that can be edited with Word from within PowerPoint without changing data in your source file.

You might be interested in
Which of the following is not a popular bitmap editing application?
zloy xaker [14]
I think the answer is c GIMP
4 0
3 years ago
Read 2 more answers
You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users
svetlana [45]

Answer:

Explanation:

Network Access Control is needed to make sure that only set of verified users access the network.

It makes sure that the users are authenticated and only set of some verified users have access to network.

Set of NAC solutions like Impulse SafeConnect, Extreme Networks, ExtremeControl, Auconet BICS, ForeScout CounterACT, Pulse Policy Secure could be installed in the system which along with basic profiling will make sure authenticated access to the network.

Other than this basic encryption-decryption algorithm can be used in this regard. Network components could use encryption algorithms like RSA and DES. These algorithms will make sure that the information from database side is well encrypted. Once that information goes to the network component. They can decrypt the encryption by generating relevant key using the same algorithm.

This will only allow authentic users to access information and also it will stop the leakage of information in between the transmission because of encryption.

4 0
4 years ago
Plugging in a cable is a good troubleshooting technique. <br> True or false
natali 33 [55]

Answer:

false

Explanation:

that does nothing

6 0
3 years ago
Is a hotdog a sandwich?​
Stells [14]

Answer:

Explanation:

Yes

4 0
4 years ago
Read 2 more answers
Whenever I ask a question I loose points I just asked a question before and I had 56 points now I have 12 now I'll probably have
lilavasa [31]
Just try to answer some questions as well, then you can keep a nice balance.
ps. Only answer the questions you know. 
5 0
3 years ago
Other questions:
  • In a programming language, a(n) ______, or command, is a word with a predefined meaning​
    6·2 answers
  • Using a for loop, print the decimal equivalents of ½, 1/3, ¼, … 1/10. Also, using a while loop, print the decimal equivalents of
    6·1 answer
  • Many computer programs contain ____ that detail the specific instructions a computer should perform (in a specific order) to car
    9·1 answer
  • Write a method named quarterstodollars. the method should accept an int argument that is a number of quarters, and return the eq
    13·2 answers
  • Return true if the given non-negative number is a multiple of 3 or 5, but not both. Use the % "mod" operator.
    12·1 answer
  • If you commit retail theft your drivers license will be ? A. Revoked, B. Suspended, C. Cancelled or D. Restricted
    7·2 answers
  • What are the "..........." called leading up to a page number?
    14·1 answer
  • Consider the following code segment:
    14·1 answer
  • How do I make my own algorithms ​
    8·2 answers
  • (python) Given the formula for conversion from Celsius to Fahrenheit
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!