1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna [14]
3 years ago
15

_____data becomes part of your destination file and remains static even if the source data change

Computers and Technology
2 answers:
labwork [276]3 years ago
6 0
I believe it is linked. linked data can become a part of the destination file but it alsoremains connected to the source file.

https://officepowerusers.weebly.com/linking-and-embedded-between-excel-and-other-programs.html

check this out to see what you get out of it.
Temka [501]3 years ago
6 0

Answer: I think it’s embadded

Explanation: When you embed or link pasted data, you make it possible to edit the data with the source application. However, edits to embedded data are reflected only in the destination file, while edits to linked data are made to both the destination and source files.

You might be interested in
What are the benefits of writing functions that use parameters and return List 2 please and explain what is return
Ratling [72]

<u>Answer and explanation:</u>

There are many benefits of writing functions that use parameters and return. Some of them are:

1. Flexibility: With functions having parameters, several values of the parameters can be used at invocation time thereby making the application flexible. For example, given the following function in Java.

<em>public void showName(String name){</em>

<em>    System.out.println("Your name is " + name);</em>

<em>}</em>

To call this method (function), the programmer could use various values for the name parameter used in the function like so:

showName("John");

showName("Doe");

If the function didn't have a parameter, it is possible it will only print a hardcoded name every time the function is called.

2. Scope Control: When a function is allowed to return a value, it helps to work around scope issues since variables declared within a function are limited to that function and do not exist outside the function. This means that the values of these variables cannot be used anywhere else outside the function in which they are being declared. However, if the function returns a value, the value can be used anywhere else in the program.

For example:

<em>public String getDouble(int x){</em>

<em>    int y = x * 2</em>

<em>    return y;</em>

<em>}</em>

The function above returns twice the value of the argument supplied to it. Since the integer variable y is declared within the function, it's value cannot be used outside the function. However, since the value is being returned by the function, it could be used anywhere the function is being called. Thanks to the return keyword.

3 0
3 years ago
I want to find Web pages that deal with the ethical aspects of genetic engineering. I also want to limit my results to education
ankoles [38]

Answer:

"ethical aspects of genetic engineering" AND site:.edu

Explanation:

Google search defines the following operators:

" "  --> search for the exact phrase between <em>quotes</em>.

site: --> search for specific <em>sites </em><em>or domains </em>by adding "site:" in front.

AND --> Limit  results to include both statements joined with <em>AND</em>.

In a generic way:

" <em>exact phrase to search</em> " AND site: <em>domain</em>

In this example:

" ethical aspects of genetic engineering " AND site:.edu

7 0
3 years ago
Who invented Computer? Answer Differently​
FinnZ [79.3K]

Answer:

Charles Babbage, an English mechanical engineer and polymath, originated the concept of a programmable computer. He is considered the "father of the computer". He invented the first mechanical computer in the early 19th century.

Explanation:

plz make me as a brainliest frd

8 0
3 years ago
Read 2 more answers
Josh is learning about hackers known for causing damage and altering functions of websites. Which type of hacker is he learning
amid [387]

Answer:

WHITE HACKERS

Explanation: When a white hat hacker discovers a vulnerability, they will exploit it only with permission and not tell others about it until it has been fixed. In contrast, the black hat will illegally exploit it or tell others how to do so. The gray hat will neither illegally exploit it nor tell others how to do so.

4 0
3 years ago
Read 2 more answers
Which of the following views is the best view to use when setting transition effects for all slides in a presentation?
alexgriva [62]

Answer:

Slide sorter view

8 0
3 years ago
Read 2 more answers
Other questions:
  • Consider the following method intended to modify the parameter names by removing all instances of the String n.
    14·1 answer
  • What is the difference in the way computers store numeric data and non-numeric data?
    13·1 answer
  • What term identifies hard drives enclosed in a case other than your computer's case? A External hard drives B Flash drives C CD-
    8·2 answers
  • The algorithm will produce a different output depending on the specific secret key being used at the time. The exact substitutio
    8·1 answer
  • What file name would allow you to easily find and edit your document later in Word Online?
    14·2 answers
  • What is the main difference between a peripheral device and other types of devices? Choose the best answer.
    12·1 answer
  • What might a designer need to consider when choosing an appropriate energy source for products and power systems
    15·1 answer
  • In Tynker, it is not possible to create a/an __________.
    6·2 answers
  • Choose all items that represent examples of good website accessibility.
    8·2 answers
  • An attacker obtains a connection to your LAN and then uses SETH to perform a MiTM attack between your system and the company RDP
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!