1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lina20 [59]
4 years ago
12

If you embed a Word table into PowerPoint, what happens when you make edits to the embedded data? A. Edits made to embedded data

change the data in the source file; however, edits made to the source file will not be reflected in the embedded data. B. Edits made to embedded data don't change the data in the source file; however, edits made to the source file will be reflected in the embedded data. C. Edits made to embedded data don't change the data in the source file, nor will edits made to the source file be reflected in the embedded data. D. Edits made to embedded data will change the data in the source file, and edits made to the source file will be reflected in the embedded data.
Computers and Technology
1 answer:
Nataly [62]4 years ago
4 0

The answer is C. Edits made to embedded data don't change the data in the source file, nor will edits made to the source file be reflected in the embedded data.

We have to understand that this table has been embedded and not linked. When a table like this is linked to PowerPoint, information can be updated when the source file is modified. On the other hand, when you embed the table without linking it, information in the Word file does not change if you modify both the source file.

You might be interested in
A(n) _____ access file is also known as a direct access file.
zloy xaker [14]
The answer to the question asked  above is <span>remote direct memory .

</span>A remote direct memory  access file is also known as a direct access file.

Hope my answer would be a great help for you.    If you have more questions feel free to ask here at Brainly.

5 0
3 years ago
__________ often causes overactive eye movement.
shepuryov [24]
The answer is ; D , xanax
3 0
3 years ago
Read 2 more answers
What are the MOST likely reasons that a student would research a topic using the internet?
Airida [17]

Answer:

To help with them with their work

5 0
3 years ago
Read 2 more answers
Which functions are available in a Word table? Check all that apply.
dexar [7]
All of them are available
3 0
3 years ago
Which of the following is one of the first steps in implementing a comprehensive security program? Setting up a Guest account Cr
yKpoI14uk [10]

Answer:

Setting a strong password policy

Explanation:

In implementing a comprehensive security program, one of the first steps would be to set up a strong password policy.

It is important to understand what the company is trying to protect from third parties.

Setting up a password policy is going to increase the security of the system through the use of strong passwords.

5 0
3 years ago
Other questions:
  • Carl sent an e-mail to more than three thousand employees about a software update. The employees need to prepare for this update
    7·2 answers
  • What type of malware actually evolves, changing its size and other external file characteristics to elude detection by antivirus
    5·1 answer
  • Which of the following is not anadvantage of simulation?
    14·1 answer
  • Which rule should be followed to stay safe online
    5·1 answer
  • See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will pri
    6·1 answer
  • Finish the program to compute how many gallons of paint are needed to cover the given square feet of walls. Assume 1 gallon can
    9·1 answer
  • What will happen when you run this program?
    12·2 answers
  • How to do the for loop in python
    12·1 answer
  • How to call a void method with no parameters IN JAVA?
    8·1 answer
  • A computer is the __________ of an attack when it is used to conduct an attack against another computer.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!