1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lina20 [59]
4 years ago
12

If you embed a Word table into PowerPoint, what happens when you make edits to the embedded data? A. Edits made to embedded data

change the data in the source file; however, edits made to the source file will not be reflected in the embedded data. B. Edits made to embedded data don't change the data in the source file; however, edits made to the source file will be reflected in the embedded data. C. Edits made to embedded data don't change the data in the source file, nor will edits made to the source file be reflected in the embedded data. D. Edits made to embedded data will change the data in the source file, and edits made to the source file will be reflected in the embedded data.
Computers and Technology
1 answer:
Nataly [62]4 years ago
4 0

The answer is C. Edits made to embedded data don't change the data in the source file, nor will edits made to the source file be reflected in the embedded data.

We have to understand that this table has been embedded and not linked. When a table like this is linked to PowerPoint, information can be updated when the source file is modified. On the other hand, when you embed the table without linking it, information in the Word file does not change if you modify both the source file.

You might be interested in
You arrive to an intersection with traffic
just olya [345]
What were you thinking there?
6 0
3 years ago
Write a program to input a number and check whether it is even or odd number
Mashutka [201]

Answer:#include <stdio.h>

int main() {

   int num;

   printf("Enter an integer: ");

   scanf("%d", &num);

   // true if num is perfectly divisible by 2

   if(num % 2 == 0)

       printf("%d is even.", num);

   else

       printf("%d is odd.", num);

   

   return 0;

}

3 0
3 years ago
token is 64 bytes long (the 10-Mbps Ethernet minimum packet size), what is the average wait to receive the token on an idle netw
ikadub [295]

Given that,

Token is 64 bytes long

The average number of stations that the token must pass = 20

We need to calculate the transmission delay for token

Using formula of transmission delay

Transmission\ delay=\dfrac{token\ size}{minimum\ size}

Put the value into the formula

Transmission\ delay=\dfrac{64\ bytes}{10\ Mbps}

Transmission\ delay=\dfrac{64\times8}{10\times10^6}

Transmission\ delay=0.0000512\ sec

Transmission\ delay=5.12\times10^{-5}\ sec

We need to calculate the average wait to receive token on an idle network with 40 stations

Using formula of average wait

\text{average wait to receive token}=\text{average number of stations that the token must pass}\times transmission\ delay

Put the value into the formula

\text{average wait to receive token}=20\times5.12\times10^{-5}

\text{average wait to receive token}= 0.001024\ sec

\text{average wait to receive token}= 1.024\ ms

Hence, The average wait to receive token on an idle network with 40 stations is 1.024 ms.

8 0
4 years ago
Select the correct answer.
trapecia [35]
OA. programs do not represent data-rate to xomolemrixjf complexity
6 0
4 years ago
What would happen if computers only had input peripherals and a CPU
Wewaii [24]
It will overheat because it don't have gpu
8 0
3 years ago
Read 2 more answers
Other questions:
  • Use the following business rules to assign name to the tables on the ERD: Note: These rules are in the context of a small retail
    7·1 answer
  • It is essential for a relay energized by alternating current to have
    13·1 answer
  • Ex. Q about the crazy effects of complements/substitutes on a wide range of goods:
    7·1 answer
  • supppose we already have a list called words, containing all the words(i.e., string).Write code that produce a sorted list with
    14·1 answer
  • Write motivation of cache memory​
    9·1 answer
  • Write a program that asks the user to enter the size of a triangle (an integer from 1 to 50). Display the triangle by writing li
    14·1 answer
  • True or false Encryption prevents hackers from hacking data?
    8·1 answer
  • What is being identified when antibodies stick to pathogens during immunostaining?
    11·1 answer
  • Give two reasons why it is not advisable to open email from unknown sources​
    13·2 answers
  • Who tryna trade in gta my psn is xMadOrNawx-_-
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!