1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Len [333]
3 years ago
15

The programming language that translates digital data into printer commands is known as

Computers and Technology
1 answer:
jolli1 [7]3 years ago
8 0
The answer is C.) PostScript
You might be interested in
Think of some local businesses that have websites. Look online and identify two different websites for businesses or services in
GenaCL600 [577]

Explanation:

Professional service-based businesses are well suited for the Internet, because the primary services they provide are information-based. A housecleaning or lawn care service business is not suited well for the Internet because the delivery of those services requires the provider to be physically present.

7 0
2 years ago
Which is the most likely reason why scientists change a model?
frozen [14]

C.) New discoveries make the current model inaccurate. Since science is all about observation and experimentation, it is logical that whenever new findings are gathered, scientific models must be modified to adapt to the information. As new ideas and concepts are uncovered, models should be updated to make them correct.

5 0
3 years ago
Read 2 more answers
Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali
frutty [35]

Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.

Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems  or   weaknesses that prevent malicious attacks.

To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer.  This was a malicious attack.

However, sometimes people can be specifically targeted to steal their data or monitor their activities.  

7 0
3 years ago
What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
Gnoma [55]
Forensics.

--------------------------------------
5 0
3 years ago
What are the four conditions to help determine whether a website is a good source for information?
Ratling [72]

Answer:

1. Credible Websites are Registered with Legitimate Institutions 2. Watch out for Dummy Content for Website Credibility Check 3. Watch out for Scam Advertisements to Verify Website Credibility 4. Professional Designs Mean Everything

Explanation:

3 0
2 years ago
Other questions:
  • Failure to verify information can lead to?
    10·1 answer
  • What is the difference between line art and continuous tone copy?
    14·1 answer
  • You have just starting working at Quantum Company. As a new programmer, you have been asked to review and correct various pseudo
    14·1 answer
  • A(n) ____________________ is hardware or software that blocks or allows transmission of information packets based on criteria su
    13·1 answer
  • I will mark brainliest
    9·1 answer
  • Which factors are involved in search engine optimization​
    10·1 answer
  • Plzzz help i need this today :(
    15·1 answer
  • Explica el empleo de cuentas y contraseñas en archivos
    6·1 answer
  • It specifies the amount of memory needed to store data.
    7·2 answers
  • Question 1 of 10
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!