The file where an object is embedded or linked
a. Read-only file
b. Destination file
c. Source file
B
Computer Science & Information Technology
You might also like to view...
Once a document has been created and modified, users can also view a(n) ________ history for any document
A) SkyDrive B) user C) document D) version
Computer Science & Information Technology
Explain how a VPN is used to create an encrypted tunnel between the client and the RAS server.
What will be an ideal response?
Computer Science & Information Technology