1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ugo [173]
4 years ago
12

The program used to create the file where you want to insert the object is called the ____.

Computers and Technology
1 answer:
BlackZzzverrR [31]4 years ago
3 0
It is called the OLE
You might be interested in
Which below best describes JavaScript? *
marysya [2.9K]

Answer:

it is a programing languwage that is useualy used to program visual or text based applications

Explanation:

6 0
3 years ago
Read 2 more answers
How would you classify the earliest historical examples of STEM discoveries provided in this lesson?
krek1111 [17]
It’s scientific discoveries
7 0
4 years ago
Please help asap<br><br><br> Thank you!
suter [353]

Answer:

Explanation:

hope this helps please like and mark as brainliest

6 0
3 years ago
How does an author develop a charterer in a story
kakasveta [241]
Ways in which an author develops a character are with physical description, behavior, insight into the character's thought processes through dialogue or narration, and insight through the opinions of other characters in a story.
6 0
3 years ago
What is the name of the file manager in microsoft windows?
Ivan
It is called Windows Explorer referred as explorer.exe<span />
7 0
4 years ago
Read 2 more answers
Other questions:
  • 1)A popular and useful tool for strategic planning is SWOT analysis. SWOT stands for
    6·1 answer
  • Tanner has had many different jobs. He previously designed the playscape at the local park with natural rocks, creeks, and veget
    10·2 answers
  • Explain why living things store energy in lipids instead of in carbohydrates
    5·1 answer
  • Which process alters readable data into unreadable form to prevent unauthorized access known as?
    8·1 answer
  • How do you delete a slide from your presentation after selecting it
    8·1 answer
  • Refer to the exhibit. A network security analyst is using the Follow TCP Stream feature in Wireshark to rebuild the TCP transact
    8·1 answer
  • 2. Suppose a computer using direct mapped cache has 220 words of main memory and a cache of 32 blocks, where each cache block co
    10·1 answer
  • 25-words or more in your OWN words the meaning of digital literacy.
    9·1 answer
  • Write a program that can perform three different activities:
    8·1 answer
  • How is unqualified assumptions a disadvantage of communication​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!