1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anna [14]
3 years ago
15

_____data becomes part of your destination file and remains static even if the source data change

Computers and Technology
2 answers:
labwork [276]3 years ago
6 0
I believe it is linked. linked data can become a part of the destination file but it alsoremains connected to the source file.

https://officepowerusers.weebly.com/linking-and-embedded-between-excel-and-other-programs.html

check this out to see what you get out of it.
Temka [501]3 years ago
6 0

Answer: I think it’s embadded

Explanation: When you embed or link pasted data, you make it possible to edit the data with the source application. However, edits to embedded data are reflected only in the destination file, while edits to linked data are made to both the destination and source files.

You might be interested in
True or False: At the Company level, users will only have access to view projects to which they have been specifically granted a
Viktor [21]

Answer:here the link

Explanation:

4 0
3 years ago
Read 2 more answers
If an interest inventory reveals that you are highly interested in solitary, introverted work, what might be the best type of ca
Deffense [45]
A writer maybe, because you can work by yourself, even at home.
6 0
2 years ago
Read 2 more answers
Which of the following hacker attacks against wireless networks are virtually undetectable?
Ede4ka [16]

Answer: A. passive attacks

Explanation:

Passive attack is a type of attack where by a system is tracked and scanned to determine how vulnerable it is and to also detect open port. The major purpose of a passive attack on a network is to gain access to the information of the target without altering the data.

A passive attack on a network may not be necessarily malicious, it is a type of network attack that is very difficult to detect.

Methods of carrying out passive attacks.

•War driving: scanning of networks is carried out to detect Wi-Fi that are vulnerable.

•Dumpster driving: Attackers or intruders search for information from discarded computers and

other gadgets, those information can help to attack a network.

7 0
3 years ago
Which of the followings is not a testingtype? [2 marks]
Agata [3.3K]

Answer:

Subsystem testing

Explanation:

This is NOT a testing type

<em>PLEASE</em><em> </em><em>DO MARK</em><em> </em><em>ME AS</em><em> </em><em>BRAINLIEST</em><em> </em><em>IF</em><em> </em><em>MY ANSWER</em><em> </em><em>IS HELPFUL</em><em> </em><em>;</em><em>)</em><em> </em>

5 0
2 years ago
Dante went to change the date for an appointment in his Outlook calendar. He double-clicked in the appointment and made the chan
meriva

The correct answer is that Dante did not click the Save and Close button before exiting the appointment.

When you make a change to an appointment in the Outlook calendar you need to click on Save in order to have the change saved in your calendar. If you do not do this the appointment will revert back to the original time and date when you exit the program.

3 0
3 years ago
Other questions:
  • When uninstalling software, it is best to delete the folder containing the software?
    11·1 answer
  • What is the slide sorter view used for?
    11·1 answer
  • What does it mean when your check engine light comes on?
    7·1 answer
  • If you decide you want to meet someone you met online, what should you do first? A. Tell your best friend. B. Call the person yo
    12·1 answer
  • Which of the following is the best example of an installation issue?
    6·2 answers
  • Write a program which will enter information relating to a speeding violation and then compute the amount of the speeding ticket
    12·1 answer
  • Consider the following code:
    6·1 answer
  • Anyone who know hacking​
    7·1 answer
  • Software is in -----language​
    5·1 answer
  • QUESTION 44 To determine whether a character entered is a letter of the alphabet, use the ________ function. isdigit fromkeyboar
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!