1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erica [24]
2 years ago
9

The data source in the document which has the information common to all documents. True or false 

Computers and Technology
2 answers:
anygoal [31]2 years ago
5 0

The data source is a document which has the information common to all documents. ... When main document is merged with data source, to get another document known. as the merged document.

That Means the answer is

<h2>TRUE</h2>
vivado [14]2 years ago
3 0

Answer:

Answer is true, the data source in the document which has the information common to all documents is true

You might be interested in
PLEASE HELP WILL MARK BRAINLIEST
Sergeeva-Olga [200]
I believe it’s boundaries
3 0
2 years ago
Read 2 more answers
I.d 9934607467<br> p.a.s.s 54321<br><br> P.L.E.A.S.E J.O.I.N. Z.O.0.M. M.E.E.T.I.N.G
dusya [7]

Answer:

You could just go to social medIa to say j.o.i.n z.o.o.m not brainly mate

7 0
3 years ago
What are at least three tips to taking photographs of insects? Why would following the tips help create better photographs?
Ber [7]

1) Use a good cam 2) Make sure you focus on it 3) Make sure you snap it at the right time....    I hope this helps!!!!!

7 0
3 years ago
Where can I learn how you hack?​
morpeh [17]

Answer:

www.udemy.com

5 0
2 years ago
Read 2 more answers
To deny a host from sending HTTP traffic destined to a specific server you will need to apply a __________ Access Control List.
DedPeter [7]

I would a Standard Access control List

There are two common access lists: The standard and extended access list.  With the standard access list, it creates filters only on source addresses and is commonly used for server-based filtering. They are not as powerful as extended access lists. Standard Access lists are typically used for restricting access to a router through HTTP and HTTPS.  


6 0
3 years ago
Read 2 more answers
Other questions:
  • Ethan wants to change the font in his document. He should _____.
    8·2 answers
  • Clicking on the Spelling &amp; Grammar button is one way to correct a spelling error in Word. Please select the best answer from
    7·2 answers
  • 3. What are the first steps that you should take if you are unable to get onto the Internet? (1 point)
    15·1 answer
  • If K is a foreign key in relation R1, then
    10·1 answer
  • What time does walmart deposit paychecks?
    5·1 answer
  • Effective presentations vary the color scheme on each slide.
    7·2 answers
  • Which technology has the potential to be misused to make atomic bombs? A. computer technology B. nuclear technology C. medical t
    14·1 answer
  • Which of the following will print I'VE GOT THIS on the screen? (5 points)
    14·1 answer
  • What is the answer 11100+01010​
    8·1 answer
  • Your project will require a 7-day work week rather than the traditional 5-day. How can you adapt the software to this new schedu
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!