1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ugo [173]
4 years ago
12

The program used to create the file where you want to insert the object is called the ____.

Computers and Technology
1 answer:
BlackZzzverrR [31]4 years ago
3 0
It is called the OLE
You might be interested in
What are language standards? At this point in your study of programming, what do they mean to
garri49 [273]
In computing, a programming language specification (or standard or definition) is a documentation artifact that defines a programming language so that users and implementors can agree on what programs in that language mean.
5 0
4 years ago
When might it be necessary or advisable to write a shell script instead of a shell function? give as many reasons as you can thi
Romashka-Z-Leto [24]

A shell function will do nothing unless it is explicitly called by other code, typically in a shell script. A shell script is a running executable process, which can call other shell scripts and/or functions. Typical operations performed by shell scripts include file manipulation, program execution, and printing text.

3 0
3 years ago
Is this photo considered rim photography
xenn [34]

Answer:

No

Explanation:

The photo in the question is just a black and white filter whereas in Rim photo, the image subject is backlit and the image is exposed to hide the subject features in shadow.

An example of Rim photography.

7 0
4 years ago
A home user reports to a network technician that the Internet is slow. The network administrator discovers that multiple unknown
BabaBlast [244]

Answer:

Option (A) A successful WPS attack has occurred

Explanation:

  • WPS stands for Wi-Fi Protected Setup.
  • Its a network security protocol in the Wi-Fi which has a vulnerability.
  • The connection to the Wi-Fi can be established through the router in four ways. They are
  • (a) PIN method
  • (b) Push button method
  • (c) Near field communication method
  • (d) USB Method.
  • Out of all the modes to be connected to the network, the PIN method has a flaw in it.
  • In this PIN method, an attacker can brute force the PIN (guessing the PIN by some techniques) and gain unauthorized access to the network.
  • In the given case in the question, the network administrator finds that multiple unauthorized devices has gained access to the network.
  • Option (A) is correct.
  • Option (B) ARP Poisoning, (C) botnet and (D) Evil Twin attack are different and so are the wrong options.  
3 0
3 years ago
Read 2 more answers
Where would the information needed to start a computer be stored
Ipatiy [6.2K]

Answer:

the ROM chip

Explanation:

the ROM chip is installed on the motherboard which helps boot the system

6 0
4 years ago
Other questions:
  • Advantage and disavantage of malware maintenance
    12·1 answer
  • A benefit of flashcards is that they are
    7·2 answers
  • Does the brain play a role in smartphone addiction
    7·2 answers
  • You have just connected a new computer to your network. The network user static IP addressing. You find that the computer can co
    12·2 answers
  • What is information technology
    11·1 answer
  • What are some good electronics that I can buy on Amazon?
    14·1 answer
  • Which symbol is at the beginning and end of a multiline comment block? ### &&& %%% """
    14·1 answer
  • Check My Work Sherri is considering replacing a processor on her laptop. The laptop is running slower than she would like. What
    9·1 answer
  • A ______ is a portable device for recording audio and video.
    10·2 answers
  • Cottonisagoodreflectorofsound​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!