1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zalisa [80]
3 years ago
12

A machine that is used to print newspaper is a

Computers and Technology
2 answers:
worty [1.4K]3 years ago
5 0

Answer: it's a printer.

xxTIMURxx [149]3 years ago
4 0

Answer:

Printing press

You might be interested in
Malware that corrupts the target operating system in such a manner that a network defender can no longer trust the native OS is
qaws [65]

Answer: Rootkit

Explanation: Rootkit is the software that helps in carrying out malicious attack by giving the permission to unauthorized user for accessing the system. This software comes with numerous tools for attacking the restricted and confidential information and resources of the system such as password stealers, key-loggers , antivirus disabling tool etc.

Network defender can lose trust when rootkit software gets into the operating system because it gives complete control for privileged accessing the system to the attacker .The detection and elimination of rootkit is also a difficult task.

Other options are incorrect because worm is malware that copies and spreads from one computer system to other. Trojan provides the unauthorized access of attacker in the system and can infect system but cannot be highly harmful as rootkit. Exploit is a code that enters the system to provide access to cyber-criminals but it can be detected .

Thus ,the correct option is rootkit.

8 0
3 years ago
Able to make a survey form using VB (Visual basics 6.0) to represent ways of conservation of
Nadusha1986 [10]
40 is the right answer
6 0
3 years ago
Read 2 more answers
An ip address in the address range 169.254.x.y, used by a computer when it cannot successfully lease an ip address from a dhcp s
Georgia [21]
Yes that is the correct answer


5 0
3 years ago
Exampels of semantic tags ?​
spayn [35]
A semantic element clearly describes its meaning to both the browser and the developer.Examples of non-semantic elements: and <span> - Tells nothing about its content. Examples of semantic elements: ,, and - Clearly defines its content.</span>
4 0
3 years ago
Pa sagot po TLE-10<br>need den po Ng solution thank you​
horsena [70]

Answer:

HAHHAHAHA HAAHA g abbabanjaja abunjing <em><u>abunjin</u></em><em><u>✌</u></em><em><u>✌</u></em><em><u>✌</u></em><em><u>✌</u></em><em><u>✌</u></em><em><u>✌</u></em>

3 0
2 years ago
Other questions:
  • Carlos owns a hardware store. He currently is not using any software to track what he has in the store. In one to two sentences,
    9·2 answers
  • Define a function begins_with_line that consumes a string and returns a boolean indicating whether the string begins with a dash
    15·1 answer
  • How might writing an online journal be different than writing in a paper one ​
    15·2 answers
  • Is this statement true or false?
    12·2 answers
  • For connection to place on any network you must have a set of standards?<br> O True<br> O False
    8·1 answer
  • Yahoo and Google are examples of __________ used to perform Internet research.
    14·2 answers
  • Spencer wants to choose a career path that wouldn’t hold him to an office or laboratory. Which of the following career paths wou
    13·2 answers
  • What is the maximum current that should be allowed in a 5.0w 220 resistor?
    12·1 answer
  • I think my knee....
    14·1 answer
  • 3) The director tells you to truck left, you must:
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!