Critical Thinking Questions
Case 10-2
?
You have been invited to participate in a roundtable discussion about integrating data between Office 2016 documents during next week's meeting of the Office Users Group at your company. A question and answer session will follow the discussion.
The second question is from an audience member who is having trouble editing a linked Excel object on a PowerPoint slide. He complains that every time he tries to edit the linked object, the original source file opens. He doesn't want to change the original source file, just the object in the destination file. You suggest that he ____.
a. move the original source file to a new location so that the link to the slide is brokenc. delete the linked object and reinsert it as an embedded object; that way none of the changes he wants to make will appear in the source fileb. convert the linked object to a picture object before he tries to edit itd. create a duplicate source file with a new name that can be used to edit the linked object
What will be an ideal response?
Answer: C
You might also like to view...
Suppose that the ADT bag had an operation that displayed its contents. Write a C++ definition for such a method for the class LinkedBag.
What will be an ideal response?
Answer the following statement(s) true (T) or false (F)
1. The network access layer is the lowest layer of the Internet reference model. 2. The ATM is a connectionless service. 3. IP is an unreliable protocol for error detection and correction. 4. The IPv4 Class A addressing mode is used in the unicast communication network with a small number of users. 5. The UDP is used when a reliable connection service is necessary.
In 2003, a consortium of scholars from a variety of universities formed the ____ as an effort to measure and report on Internet filtering and the control of access to various types of information.
A. NSF B. ONI C. W3C D. NNT
Data in a worksheet is NOT always formatted in a way you can use it
Indicate whether the statement is true or false