1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
matrenka [14]
3 years ago
12

Which printing process uses a toner that sticks to the charged drum and thermally fuses onto a page?

Computers and Technology
1 answer:
PSYCHO15rus [73]3 years ago
7 0
<h2>Hello!</h2>

The answer is: B. electrostatic printing.

<h2>Why?</h2>

Electrostatic printing (laser printing) is the process where a laser beam passes   repeatedly (back and forth) over a negatively charged cylinder (drum) drawing a differentially charged image, then,  the drum is coated in electrically charged powder (toner), finally,  the paper is heated in order to fuse the toner to the paper.

Have a nice day!

You might be interested in
Which setting is used to determine the order of printing pages? Collation Settings, Orientation Settings, Margin Settings, Scali
VARVARA [1.3K]

Answer:

colliation

Explanation:

8 0
3 years ago
Read 2 more answers
Why computers are called "COMPUTER"?
Lady_Fox [76]

Because it ‘computes’ certain tasks, get it. It’s like saying ‘the puncher’ for someone who punches stuff.

8 0
4 years ago
Help me please!! Brainliest for answering this question.
cluponka [151]

That sounds like a reader's activity level

8 0
3 years ago
6. Which of the following is malware? (1 point)
marusya05 [52]
Software to damage computers
5 0
3 years ago
Read 2 more answers
________________ involves tricking other people into breaking security procedures and sharing sensitive information.
Nuetrik [128]

Answer:

The right answer is social engineering.

Explanation:

social engineering has different meanings in terms of computer security and social studies.

In computer security, social engineering can be defined as the practice to manipulate some people so that they give their personal credentials with the attacker. Their first moto is to gather the information of that user by fraud.

It can be the credential of banking, system access etc.

Hence, the most appropriate answer is social engineering.

5 0
3 years ago
Read 2 more answers
Other questions:
  • Describe the difference between fuses and circuit breakers. where might each type of device find its best use? g
    10·1 answer
  • Assume that an array of Integers named a that contains exactly five elements has been declared and initialized. In addition, an
    12·1 answer
  • Media messages are communicated through which of the following:
    8·2 answers
  • Representations and Conversions
    8·1 answer
  • The first step in the information processing cycle is _____, which involves entering data into the computer.
    8·1 answer
  • Which of these is NOT a benefit of being connected 24/7?
    11·1 answer
  • Which of the following is NOT an example of one of the six primary ways businesses use the Internet?
    10·2 answers
  • write up a performance review for a fellow employee. Imagine you work in a shop and this is a fellow salesperson on the shop flo
    9·1 answer
  • The minimum recommended standards for the operating system, processor, primary memory (RAM), and storage capacity for certain so
    9·1 answer
  • Use the round function to modify the program to display at most two digits of precision in the output number.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!