1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novosadov [1.4K]
1 year ago
11

Why should you make sure the paper being used in a printer is dry and not damp?

Computers and Technology
1 answer:
Goryan [66]1 year ago
6 0

Answer:

because the printer ink is liquid

Explanation:

you need a dry paper to let the ink sit in place and print out the exact same thing that u needed to print if you're printing on a damp paper there is a chance it will affect the output of whatever your printing

You might be interested in
Why do we install doorbells in our house
Vinil7 [7]

Explanation:

It's placed near the door. When a visitor presses the button, the bell rings inside alerting you that someone is at the door.

6 0
2 years ago
Read 2 more answers
Which tab is used to insert a hyperlink onto a slide
Roman55 [17]
The tab used to instead a Hyperlink into a slide is the Insert tab under the “Links” group.
5 0
2 years ago
Read 2 more answers
Your organization has hired a penetration tester to validate the security of your environment. The penetration tester needs to d
yulyashka [42]

Answer:

Port scanner

Explanation:

The penetration tester would most likely use a port scanner. A port scanner can be explained to be an application that is made to check a server or host for ports that are open. This application can also be used by administrators to check their security networks so as to know those network services that are running on a host and also to know existing vulnerabilities. Attackers also use this to exploit victims.

5 0
2 years ago
Which of the following is a proprietary OS for desktop and laptop computers?
Leni [432]

Answer:

That would be Windows.

Explanation:

If you have any questions feel free to ask in the comments - Mark

Also when you have the chance please mark me brainliest.

3 0
2 years ago
The protections from the security software must continue when the device is taken off the network, such as when it is off-grid,
snow_lady [41]

Answer:

third ighjojdudjz

ghddduewjj

wkckdjjj

Explanation:

cchmddkhwmx

ndhdnahdd

jruditndjed

3 0
3 years ago
Other questions:
  • You should use _____ software for writing a letter.
    10·1 answer
  • Businesses sometimes achieve uninterruptible service by using a technology known as ____ to keep a mirror copy of all their data
    11·1 answer
  • Network signaling is a function of which layer of the osi model
    10·1 answer
  • In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will
    8·1 answer
  • Over the past year alone, more than _________ have been stolen from Target.
    10·2 answers
  • Which of these best represents a call to action?
    7·2 answers
  • List five applications field of a computer?​
    8·1 answer
  • Does anyone have a rbx account? If they do friend request Tribalchief777
    8·1 answer
  • Question 2 of 10
    15·1 answer
  • Which emerging technologies will have more injury on our day to day country & How?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!