1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergij07 [2.7K]
3 years ago
9

What does this image represent?

Computers and Technology
2 answers:
gayaneshka [121]3 years ago
8 0
The answer is c. Inkjet printer
Dmitrij [34]3 years ago
3 0
I think your answer is C, inkjet Printer.
You might be interested in
All of the following are benefits of automation except
Tasya [4]

Question 1:

4. it increases the number of employees

Question 2:

2. false

Question 3:

2. it causes great damage to the ozone layer

Question 4:

1. true



6 0
3 years ago
Which of the following is not an Operating System? (1 point)Windows
kobusy [5.1K]
The answers of the following are:

1.  The answer is Linux. It is not an Operating System.
2. Windows XP 2000 and Windows XP Home Edition have the same interface design. 
3. Linux is the operating systems which is considered to be open source.
4. Mac OS is an operating system which is considered to be the most popular with graphic and multimedia designers
5. The software programis the number and variety of programs available for a particular operating system.
4 0
4 years ago
20<br>Calculate the kinette energy of a body the speed<br>that will be a mass tragm​
jolli1 [7]

Answer:

20

Explanation:

4 0
3 years ago
External network security threats can include management failure to support organization-wide security awareness, inadequate sec
Ganezh [65]

Answer:

The answer is "Option B".

Explanation:

In external networking, it establishes the informal links beyond the size of the firm, which supports its career, and these networks may be used for help, invaluable guidance.

This system would be a different point of view to provide the privacy protection for the system connectivity, and in the internal system protects its system protects all its data, that's why it is false.

6 0
3 years ago
What are HITs????????
nasty-shy [4]

It is namely an internet made by someone...

8 0
4 years ago
Other questions:
  • Suppose you want to delete an existing file from within word. What would you do?
    8·1 answer
  • What is the recommended solution to configure this automated behavior? UC has a requirement that an opportunity should have a fi
    8·1 answer
  • Which of the following commands contains an error?
    8·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    11·1 answer
  • The presentation layer describes the layer where computers interact with _____
    8·2 answers
  • What is the difference between a Network Diagram and a Wiring Semantic?
    5·1 answer
  • Design a full adder circuit using NAND gates only (input : A, B, Cin and output = S, Cout).
    5·1 answer
  • Which application is a digital version of a manual typewriter? A. Database B. Presentation C. Spreadsheet D. Word processor
    8·2 answers
  • Fre.....ee p......oint....s pt 2
    10·2 answers
  • In two-dimensional arrays, the _____________ is always listed second.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!