1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ruslelena [56]
3 years ago
7

Develop a spreadsheet that compares the features, initial purchase price, and a two-year estimate of operating costs (paper, car

tridges, and toner) for three different color laser printers. Assume that you will print 50 color pages and 100 black-and-white pages each month. Now do the same comparison for three inkjet printers. Write a brief memo on which of the six printers you would choose and why. Develop a second spreadsheet for the same printers, but this time assume that you will print 250 color pages and 500 black-and-white pages per month.
Now which of the printers would you buy and why?
Computers and Technology
1 answer:
antiseptic1488 [7]3 years ago
3 0

Answer:

dgfdghvcsdhjccxadhhvcsdhjvczafjmbd FYI jjgdc

You might be interested in
Why should you limit what information is in your digital footprint?
oee [108]

Answer:

Your “digital footprint” includes all traces of your online activity, including your comments on news articles, posts on social media, and records of your online purchases. When you know the boundaries of your digital footprint and take steps to contain it, you can help protect your identity and your reputation.

Explanation:

3 0
3 years ago
The incident results in huge losses of revenue as a result their mobile app service is withdrawn. Investigators discovered a vul
zlopas [31]

Answer:

The attackers used the code injection

Explanation:

<em>Because, the HMTL5 allows data and code to be mixed together, making code injection attacks possible. </em>

6 0
3 years ago
Any computer or device on a network that can be addressed on the local network is referred to as a:
Umnica [9.8K]
<span>Any computer or device on a network that can be addressed on the local network is referred to as a: node.</span>
5 0
3 years ago
How acid rain pollution will affect the food chain
babunello [35]

Explanation:

Acid rain can cause serious problems for many different animals and plants. As a result, the entire food web is affected. For example, acid rain can cause phytoplankton in lakes to die. Insects, which rely on phytoplankton for food, now have less food to eat, and they begin to die as a result.

3 0
3 years ago
Read 2 more answers
Which of the following tools and techniques shows theimpacts of one decision over another as well as the probability andcost of
Nezavi [6.7K]

Answer: Probability/impact risk matrix

Explanation: Probability/impact risk matrix is type of matrix that defines the probability as well as impact that depicts whether the risk is low ,high or moderate.

Impact matrix is sort of tool which helps in conversion of any plan into a action. Probability matrix help in defining the chances in defining the risk.The positioning of the impact value of risk is plotted  on the vertical axis and performance value on the horizontal axis.

Thus probability/impact matrix is the correct tool for the problem mentioned in the question.

6 0
3 years ago
Other questions:
  • Which is the correct process for attaching a file?
    12·1 answer
  • Rest or take a break every __ minutes when typing. Please help!
    5·2 answers
  • Can anybody tell me how to screenshot on a PC with no "print screen" button?
    11·1 answer
  • NEED BY 15 MINUTES PLEASE! WILL MARK BRAINLIEST!You can create special effects in an image using a camera or a photo-editing too
    5·1 answer
  • Write a program that first reads in the name of an input file and then reads the input file using the file.readlines() method. T
    7·1 answer
  • Sarah is a detail-oriented programmer. While testing her program, what other skill would she have to apply in order to detect al
    11·1 answer
  • How to fix a light blub
    11·2 answers
  • What are the peripherals of a computer ​
    12·1 answer
  • What is the main fuction of command interpreter​
    11·1 answer
  • Rebbeca has finished with the research and outline portion of her slide presentation. Now, the next logical step is to begin wor
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!