If you find after you create an object and place it in another program that you want to change the original, you can use ____ editing to change it.
A. linked
B. roundtrip
C. integrated
D. embedded
Answer: B
Computer Science & Information Technology
You might also like to view...
What is an advantage of restricting checkpoints for VMM users?
A. reduced memory usage B. improves security C. reduced hard disk space usage D. improves network performance
Computer Science & Information Technology
List five good information security practices that prevent attacks on the desktop.
What will be an ideal response?
Computer Science & Information Technology
When contents of comments are too lengthy to show in a comment balloon, you can display them completely in the ________ Pane
Fill in the blank(s) with correct word
Computer Science & Information Technology
Most blogging applications will use the title of a blog post as a hyperlink to the post's ____ page.
A. share link B. hyperlink C. archive link D. permalink
Computer Science & Information Technology