After create an object in one program

Assignment Help Basic Computer Science
Reference no: EM13948451

1. In the dialog box shown in the accompanying figure, you should select __________ to create a link with the source object.
a. Paste
b. Paste link
c. Display as icon
d. Microsoft® Excel® Workbook Object

2. You can copy __________ and numbers between Word and Excel®.
a. Ribbons
b. commands
c. words
d. formula bars

3. The formula __________ in Excel® will calculate the mean of the values in cells B14 through F14.
a. =SUM(B14:F14)
b. =MEDIAN(B14:F14)
c. =MAX(B14:F14)
d. =AVERAGE(B14:F14)

4. If a text value in a Word document is automatically updated after a corresponding text value is updated in an Excel® source document, you can infer that the text value in Word is __________ the source document.
a. embedded in
b. linked to
c. copied to
d. pasted to

5. Because the value 80% pointed to by item 2 in the accompanying figure is connected to a value in a source Excel® file, the value is called a(n) __________ object.

a. copied

b. embedded
c. edited
d. linked

6. Microsoft® Office provides __________ integration methods.
a. three
b. four
c. five
d. six

7. The photograph shown in the accompanying figure will be copied into a(n) __________ file.

a. binary
b. destination
c. image
d. zipped

8. Items 1 and 3 in the accompanying figure have been __________ from an Excel® file.

a. linked
b. converted
c. copied
d. moved

9. The icon identified as item 2 in the accompanying figure is the __________ button.

a. Use Destination Theme & Embed Workbook

b. Use Destination Theme & Link Data
c. Picture
d. Keep Source Formatting & Link Data

10. Suppose you have placed the following items to the Clipboard: a photograph, a text value, a column chart, and a table. If the items were copied in the order listed, the __________ would be at the bottom of the list.
a. text value
b. table
c. photograph
d. column chart

11. After you create an object in one program, you can choose to either __________ the object or embed it in another program.
a. recover
b. link
c. redefine
d. capture

12. Microsoft® Office programs are designed to work together through a process called:
a. validation.
b. integration.
c. certification.
d. authentication.

13. If you want to paste an object with a plain text format, you should select __________ in the list box shown in the accompanying figure.
a. Unformatted Text
b. Formatted Text (RTF)
c. Bitmap
d. HTML Format

14. In the accompanying figure, the pane pointed to by item 1 is known as:

a. command tab.

b. title bar.
c. Ribbon.
d. Clipboard.

15. The icon pointed to by item 1 in the accompanying figure represents the __________ button.

a. Keep Source Formatting & Link Data
b. Use Destination Theme & Link Data
c. Paste Options
d. Keep Source Formatting & Embed Workbook

Reference no: EM13948451

Questions Cloud

The content theories of motivation : The Content Theories of Motivation - Maslow's Hierarchy of Needs, Herzberg's Two-Factor Theory, Alderfer and McClleland's Theories of Motivation - are all about the factors within a person and the needs that motivate people.
Implement a stack and queue program using priority queue : I must implement a stack class from my previously developed pq (priority queue) class using the data in StackStr(1).txt and also to implement a queue using the data in Qstr.txt.
What are the gander mountain manager null : What are the Gander Mountain manager's null and alternative hypotheses? How should he go about taking samples to gather data for testing the hypotheses?
Understanding terrorism : As you put together your paper this week, pay close attention to the following guidelines. Allow yourself time to create multiple drafts of your work so you can craft a paper that best represents your understanding of course material and your ability..
After create an object in one program : If a text value in a Word document is automatically updated after a corresponding text value is updated in an Excel® source document, you can infer that the text value in Word is __________ the source document.
Rate of spin about the z axis : The radius of gyration about an axis passing through the axis of symmetry of the 1.6-Mg space capsule is kz = 1.2 m and about any transverse axis passing through the center of mass G, kt = 1.8 m.
Identify bloom''s levels in a student portfolio sample : In the first part of this assignment you will identify Bloom's levels in a student portfolio sample. Read through the narrative at the following link:  Sample Student Narrative. It is in the subject area of acting performance. Use what you know about..
Program that reads a word and writes the reverse of the word : Show every stack operation and the state of both the numbers and operations stacks after every push and pop when evaluating the arithmetic expression: (((10 * 9) - 3) * (((8 * 2) + 16))).
What is philip displaying : Philip notices that employees of the South Korean company he is working with bow when they greet each other. Philip also begins to bow to those he meets. What is Philip displaying

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Many-to-many relationship

What are some issues when working with a many-to-many relationship? Provide some examples.

  Discuss some of the expected trends that will continue

discuss some of the expected trends that will continue or emerge in the coming years

  Distinct integers that has the following property

You have an array A[0], A[1], ..., A[n - 1] of distinct integers that has the following property:The values in the array increase up to index p for some p between 0 and n - 1, and then decrease for all indices beyond p through positio

  Using jflab find a linear grammar for the language

The language L= {a n b m : n?m} is context free. Using JFlab find a linear grammar for the language.

  The myths of innovation

1. Scott Berkun's book, The Myths of Innovation, holds that many of the popular images of how innovation works do not hold up when scrutinized closely. He examines ten innovation stereotypes, and demonstrates how they generally do not hold true.

  Threat vulnerability, and exploits assessment practices

There are multiple ways to bring threats and vulnerabilities to light. Common practices and lessons learned can help us explore for known or common threats, but how does an organization with a unique or highly unusual setup discover its vulnera..

  Compare and contrast magnetic tapes

Realize business and organizational data storage and fast access times are much more important than they have ever been.

  What strategic role can information play in business process

What strategic role can Information play in business process re-engineering

  Create a visual basic program

Create a Visual Basic program that creates a bill for an automobile repair shop. The shop bills customers at the rate of $35 per hour for labor. Parts and supplies are subject to a 5% sales tax.

  Design patterns in today-s development environments

In System Analysis and Design: Design Patterns - How widely used are design patterns in today's development environments?

  How silicon-based semiconductors revolutionized computing

New materials frequently lead to new technologies that change society. Describe how silicon-based semiconductors revolutionized computing.

  The techniques in discovering the requirements

What are some of the techniques in discovering the requirements (fact finding) for a system?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd