If you find after you create an object and place it in another program that you want to change the original, you can use ____ editing to change it.

A. linked
B. roundtrip
C. integrated
D. embedded


Answer: B

Computer Science & Information Technology

You might also like to view...

What is an advantage of restricting checkpoints for VMM users?

A. reduced memory usage B. improves security C. reduced hard disk space usage D. improves network performance

Computer Science & Information Technology

List five good information security practices that prevent attacks on the desktop.

What will be an ideal response?

Computer Science & Information Technology

When contents of comments are too lengthy to show in a comment balloon, you can display them completely in the ________ Pane

Fill in the blank(s) with correct word

Computer Science & Information Technology

Most blogging applications will use the title of a blog post as a hyperlink to the post's ____ page.

A. share link B. hyperlink C. archive link D. permalink

Computer Science & Information Technology