1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ugo [173]
3 years ago
12

The program used to create the file where you want to insert the object is called the ____.

Computers and Technology
1 answer:
BlackZzzverrR [31]3 years ago
3 0
It is called the OLE
You might be interested in
Read the underlined sentence on page 1.
olasank [31]

Answer:

It for shadows the reason that peles temper is not just a rumor wich is proven in the answer she gives

Explanation:

it says that you should forget the rumors and her fiery temper whic means ti is true

6 0
3 years ago
A class member function that automatically initializes the data members of a class is called?
____ [38]

A class member function that automatically initializes the data members of a class exists called a constructor.

<h3>What is meant by member function?</h3>

Operators and functions that are designated as members of a class are known as member functions. Operators and functions declared with the friend specifier are not included in member functions. These are referred to as class pals. Together, data members and member functions describe the characteristics and actions of the objects in a Class. Data members are the data variables, and member functions are the functions used to control these variables.

In C++, there are typically five different types of member functions available. Specifically, friend member functions and basic, static, const, inline functions. Classes-only functions are member functions. Any private, protected, or public member of its class may be accessed using the public member function. Any member function of a class, not just the public ones, has access to every single other member that has been declared inside the class. so are easy to programme.

Hence, A class member function that automatically initializes the data members of a class exists called a constructor.

To learn more about member functions refer to:

brainly.com/question/15554910

#SPJ4

3 0
2 years ago
A spiked collar that extends horizontally for up to 3 feet from the pole is an example of what kind of technology? and that no u
slega [8]

This technology is known as an anti-climb collar.

Spiked collars are used to protect equipment mounted on poles like CCTV or in areas where you can easily climb a pole over a security fence. This technology offers a very simple and practical solution to protecting poles against thieves and vandals.

3 0
3 years ago
A heart murmur is caused by incorrect operation of ________?​
Levart [38]

Answer:

the valves

Explanation:

science explains your questions answer. also did you know that the queen was an engineer in WWII? you probably did but you need 20 characters to submit an answere trust me it is the valves.

6 0
3 years ago
What is the output?
Aleksandr-060686 [28]

Answer:

The output of code is 20.

Explanation:

We need to give output of the following code:

numB = 25

while numB > 13:

numB = numB - 5

print(numB)

Solution:

We will check the condition of while loop, if the condition is true, then the statements inside the loop will be executed. Since brackets are not available so, only one statement is linked with while loop.

Executing the statements, we check condition while numB > 13 (25>13) is true, next statement will be executed numB = numB - 5  (20=25-13) so, when print(numB) will be executed, we will get 20.

The output of code is 20.

4 0
3 years ago
Read 2 more answers
Other questions:
  • Torque is defined as _____.
    7·1 answer
  • A bug collector collects bugs every day for 5 days. Write a program that keeps a running total of the number of bugs collected d
    12·1 answer
  • Which of these forms of multimedia would most likely contain both music and text:
    14·1 answer
  • ____ involves taking data from your database and putting it into an electronic file in a format that another external applicatio
    9·1 answer
  • When a security professional is presented with a contract drawn up by a company's legal department, which allows them to "hack"
    13·1 answer
  • Consider two different implementations of the same instruction set architecture (ISA). The instructions can be divided into four
    14·1 answer
  • Lucas wants to expand his vocabulary to better understand the sentence below. The insidious burglar moved through the house unhe
    7·2 answers
  • Write at least 4 sentences
    9·1 answer
  • Hello guys please help me <br>list and identify the components of computer ​
    15·1 answer
  • In large organizations, database design and management is handled by a database _____.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!