1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ruslelena [56]
3 years ago
7

Develop a spreadsheet that compares the features, initial purchase price, and a two-year estimate of operating costs (paper, car

tridges, and toner) for three different color laser printers. Assume that you will print 50 color pages and 100 black-and-white pages each month. Now do the same comparison for three inkjet printers. Write a brief memo on which of the six printers you would choose and why. Develop a second spreadsheet for the same printers, but this time assume that you will print 250 color pages and 500 black-and-white pages per month.
Now which of the printers would you buy and why?
Computers and Technology
1 answer:
antiseptic1488 [7]3 years ago
3 0

Answer:

dgfdghvcsdhjccxadhhvcsdhjvczafjmbd FYI jjgdc

You might be interested in
Inserting and deleting text is a basic editing task in word processing.<br><br> True or false
Katyanochek1 [597]
The answer should be true
3 0
3 years ago
Read 2 more answers
My serious question that needs answering pronto!!!
timama [110]

Answer:

It depends on what the button looks like but sometimes you need to press it. If it is an actual computer press the power on button attached to the box that should be hooked up to the computer.

Explanation:

7 0
3 years ago
___________ is some danger that can exploit a vulnerability.
andreyandreev [35.5K]

<u>Threat </u>is some danger that can exploit a vulnerability.

<h3>What is Threat?</h3>

Threat  is seen as Anything that can be able to take advantage of a vulnerability, intentionally as well as  accidentally, and take or damage, the  asset of a person.

Note that a threat is that which a person or firm is protect against and Vulnerability is seen as Weaknesses.

Therefore, <u>Threat </u>is some danger that can exploit a vulnerability.

Learn more about vulnerability from

brainly.com/question/25633298

#SPJ1

8 0
2 years ago
Discuss the differences between dimensionality reduction based on aggregation and dimensionality reduction based on techniques su
abruzzese [7]

Answer:

Following are the difference to this question can be defined as follows:

Explanation:

  • In terms of projections of information into a reduced dimension group, we can consider the dimension structure of PCA and SVD technologies.  
  • In cases of a change in the length, based on consolidation, there's also a unit with dimensions.
  • When we consider that the days have been aggregated by days or the trade of a commodity can be aggregated to both the area of the dimension, accumulation can be seen with a variance of dimension.
5 0
4 years ago
WHICH PROGRAMMING LANGUAGES ARE THE BEST FOR PROGRAMMING?
Andrews [41]

Answer:

python is probably the best is you are a begginer

java and C++ are good too

6 0
3 years ago
Other questions:
  • Kai is a software engineer who started his own IT consulting firm. His friend, Catalina, is the owner of a store that sells offi
    13·2 answers
  • Describe an application where a parallel circuit might work better than a series circuit.
    15·1 answer
  • A Silicon Valley billionaire purchases 3 new cars for his collection at the end of every month. Let a_n denote the number of car
    8·1 answer
  • python (Business: check ISBN-10) An ISBN-10 (International Standard Book Number) consists of 10 digits: d1d2d3d4d5d6d7d8d9d10. T
    12·1 answer
  • A write once, read many (worm) disc is a common type of _____.
    6·1 answer
  • For this assignment, you will write a program that calculates gross and net revenue for a movie theater. Consider the following
    15·1 answer
  • Write a Java program that creates a two-dimensional array of type integer of size x by y (x and y must be entered by the user).
    7·1 answer
  • *
    6·1 answer
  • Read the attached paper titled A Survey of Coarse-Grained Reconfigurable Architecture and comment on it. Make sure to specifical
    5·1 answer
  • HURRRY WILLL GIVE BRAINLIST!!!!!!
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!