The file where an object is embedded or linked

a. Read-only file
b. Destination file
c. Source file

B

Computer Science & Information Technology

You might also like to view...

Once a document has been created and modified, users can also view a(n) ________ history for any document

A) SkyDrive B) user C) document D) version

Computer Science & Information Technology

Explain how a VPN is used to create an encrypted tunnel between the client and the RAS server.

What will be an ideal response?

Computer Science & Information Technology