1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naddika [18.5K]
2 years ago
15

Jhon bought a new printer for his desktop computer. It does not work even though he checked all the cables and cords. What do yo

u think he forgot to connect? *
A. The installer
B. The ports and plugs
C. The Device Driver
D. The Utility Software

Computers and Technology
1 answer:
Roman55 [17]2 years ago
4 0
I think it’s d sorry if it ain’t ..
You might be interested in
What is the purpose of a mail merge field?
goblinko [34]

Answer:

Mail Merge is a way to send the same message to a large number of persons, with each one properly addressed to a specific person.

Explanation:

8 0
3 years ago
Read 2 more answers
What is the most important external issue when using social media in emergency management?
DerKrebs [107]
Th e most important external issue when using social media in emergency management is the disaster response. Disseminating information through social media is very effective especially when there are calamities and a disaster respond from both private and public sector is very urgent.
8 0
3 years ago
Which function prompts the user to enter information?
Rzqust [24]

Answer:

input() prompts the user to enter information

6 0
3 years ago
Read 2 more answers
Which of the following forces all traffic, communications, and activities through a single pathway or channel that can be used t
Ad libitum [116K]

Answer:

Option b. Choke point

Explanation:

In firewall, a choke point can be defined as a single point which allows all of the network traffic including incoming and outgoing to be funneled. As the passage of the whole traffic through the choke point regulates the flow as it focus monitoring  and controls bandwidth consumption, provides authentication, control efforts like Internet firewalls.

7 0
2 years ago
IN PYTHON LANGUAGE
shtirl [24]

favorite_color = input("Enter favorite color:\n")

pet = input("Enter pet's name:\n")

num = input("Enter a number:\n")

print("You entered: "+favorite_color+" "+pet+" "+num)

password1 = favorite_color+"_"+pet

password2 = num+favorite_color+num

print("First password: "+password1)

print("Second password: "+password2)

print("Number of characters in "+password1+": "+str(len(password1)))

print("Number of characters in "+password2+": "+str(len(password2)))

This works for me.

8 0
2 years ago
Read 2 more answers
Other questions:
  • Is a protocol that allows users to log on to and access a remote computer?
    8·1 answer
  • A/An ___ is a series of instructions or commands that computer follows used to create software
    10·2 answers
  • Why isn't my rank move from ambitious to virsto i met all the requirements
    8·2 answers
  • Explain which are of the brain you think might light up to show that you are telling a lie and why
    10·1 answer
  • A search engine attempts to catalog every Web page by topic through the use of a ____
    10·1 answer
  • Monica is teaching herself to paint. What web resource would be the most helpful
    14·1 answer
  • Tree diagrams are useful for
    12·1 answer
  • A blogger writes that the new "U-Phone" is superior to any other on the market. Before buying the U-Phone based on this review,
    7·2 answers
  • Which of these allows the programmer to put data inside a variable?
    5·1 answer
  • Data will zip through a 5G network much faster than through a 4G network because of the 10-fold difference in _____.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!