When you copy part or all of the document created in one Office program, the item being copied is called the ____.

A. embed
B. paste
C. object
D. link


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following statements are true?

a. Text I/O is built upon binary I/O to provide a level of abstraction for character encoding and decoding. b. Text I/O involves encoding and decoding. c. Binary I/O does not require conversions. d. Binary I/O is more efficient than text I/O, because binary I/O does not require encoding and decoding. e. Binary files are independent of the encoding scheme on the host machine and thus are portable.

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. To make your website more secure, you must ask the user or customer to give up some privacy. 2. The fields of disaster preparedness and disaster recovery are independent of each other. 3. During disaster planning, redundancy of data provides the key for eliminating single points of failure for servers running Web applications. 4. One way to evaluate your website is to find out more about the website's visitors.

Computer Science & Information Technology

The McCumber Cube provides a ____ description of the architectural approach widely used in computer and information security.

A. linear B. triangular C. graphical D. semantic

Computer Science & Information Technology

Mako is reorganizing some of the tasks in his project plan. He selects a Summary task and its subtasks. The pointer changes to a four-headed arrow. What does this tell Mako?

a. He can copy the tasks, then paste somewhere else in the project plan. b. He can now drag and drop these tasks to another location in the project plan. c. He can delete the tasks, go to where he wants them to be, and then Undo. d. He can right-click, then choose to Move the tasks to another location.

Computer Science & Information Technology