1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Novosadov [1.4K]
2 years ago
11

Why should you make sure the paper being used in a printer is dry and not damp?

Computers and Technology
1 answer:
Goryan [66]2 years ago
6 0

Answer:

because the printer ink is liquid

Explanation:

you need a dry paper to let the ink sit in place and print out the exact same thing that u needed to print if you're printing on a damp paper there is a chance it will affect the output of whatever your printing

You might be interested in
Often an extension of a memorandum of understanding (MOU), the blanket purchase agreement (BPA) serves as an agreement that docu
Alchen [17]

Answer:

FALSE

Explanation:

The blanket purchase agreement (BPA) can not serves as an agreement that documents the technical requirements of interconnected assets but the Interconnection service agreement (ISA).

3 0
3 years ago
Jane sold many notebooks at her school fair and earned a good amount of cash. To keep a record, she entered all the cash values
pantera1 [17]
Use tab key & shift+$
6 0
3 years ago
What type of application would be appropriate for learning a foreign language?
Marysya12 [62]

Answer:

Education

Explanation:

Most apps for <u>learning</u> a new language are for educational purposes and are most likely an education type of app.

7 0
3 years ago
Read 2 more answers
A firewall can consist of all devices positioned on the network _____________.
ale4655 [162]

Answer:

The answer to this question is "perimeter".

Explanation:

In computer science, the firewall is used to provide a network security system that manages network traffic like incoming and outgoing signals. This traffics is based on predetermined security rules. The firewall typically installs a boundary between a trusted inner network and an untrusted outer network, such as the Internet. It is a software concept and Perimeter firewalls manage the flow of network traffic and host or organization's border the boundary that provides the first line of security against outer attacks and blocking access to inappropriate content from inside an organization.

6 0
3 years ago
Information that indicates ground air or navy force levels or dispositions is what security?
AlexFokin [52]

Information that indicates ground air or navy force levels or dispositions is <u>confidential</u> security.

Security for a country's higher organizations is essential for a nation's protection.

Serious information like the nuclear organizations, army, navy, and ground air is at a higher risk for threats and hence requires higher security.

The information in such higher organizations is kept confidential and no third person is allowed access to the code of conduct of such organizations.

If information is leaked from the ground air or from navy force levels then there can be serious consequences for it. Hence, such information is always kept under confidential security.

To learn more about security, click here:

brainly.com/question/25375059

#SPJ4

8 0
1 year ago
Other questions:
  • The _____ command icon looks like a small clipboard with a page attached.
    6·1 answer
  • During an experiment, if you purpose change the temperature to test a hypothesis the temperature is called what??
    6·1 answer
  • The function below takes a string argument sentence. Complete the function to return the second word of the sentence. You can as
    5·1 answer
  • When I try to invite someone to be my friend on brainly, for some people, it says, "Somethings up. Invitation wasn't sent". Can
    8·1 answer
  • How does technology improve convenience, but impact our privacy?
    8·1 answer
  • John has subscribed to a cloud-based service to synchronize data between his smartphone, tablet, and PC. Before allowing the dat
    10·1 answer
  • Given the following sets, for each set operation provide the elements of the resulting set in set notation or using a well-known
    5·1 answer
  • What is the answer 11100+01010​
    8·1 answer
  • Complete the function to return the factorial of the parameter using recursion,
    10·2 answers
  • Which of the following guidelines about the subject line of e-mail messages is most appropriate?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!