1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ollegr [7]
3 years ago
7

A user from the accounting department has contacted you regarding problems with a dot matrix printer. When you examine the outpu

t from the printer, several letters have missing dots from the page. What should you do?
Computers and Technology
1 answer:
Mama L [17]3 years ago
5 0

Answer:

Replace the printhead is the correct answer.

Explanation:

Because in the following statement, that person is from the department of the accounting then, he call the technician regarding the problem occurs in the printer which is dot-matrix printer and when he examined the dot-matrix printer and replace the printhead because when he print any document then, he finds that some letters have missing from the page.

You might be interested in
What were the first microblogs known as
Greeley [361]
The first micro blogs was once known a tumblogs
6 0
3 years ago
Read 2 more answers
Encrypt the message ENCRYPTION using a tabular transposition cipher with encryption keyword ONE. If necessary, pad the message w
vfiekz [6]

Answer:

Encrypted message: CPONYIERTN

Explanation:

Message = ENCRYPTION

keyword = ONE

keyword ONE is of length 3 so the rows are of length 3

Permutation is given by the alphabetical order of the letters in the keyword ONE. Here E appears first in alphabet, then comes N and in last comes O so the order would be 321.

Now the message ENCRYPTION is written in tabular form with width of the rows defined by a keyword ONE

O     N     E

3      2      1

E      N     C

R      Y     P

T       I     O

N

Now this message is read by the column in alphabetic order of the keyword ONE.

Since alphabetic order of E is 1 so the column under E is read first which has the letters:

CPO

Then column under N is read which has the letters:

NYI

In the last the column under O is read which has the letters:

ERTN

So the encrypted message is:

CPONYIERTN

6 0
3 years ago
In Tynker, it is not possible to create a/an __________.
xz_007 [3.2K]

Answer:

yes

Explanation:

7 0
2 years ago
Read 2 more answers
You have stumbled on an unknown civilization while sailing around the world. The people, who call themselves Zebronians, do math
marshall27 [118]

Answer:

a. 6 bits

b. 1

Explanation:

Ans (a)

40 Characters need to be represent by binary coded Zebronian (BCZ) , So You will need 6 bits.

5 bits wold only give you 32 = 2 x 2 x 2 x 2 x 2 unique characters.

So 6 bits would allow you to represent 64 characters.

Ans(b)

BCD = Binrary Coded Decimal is very common in electronics, particularly it displays numerical data.

BCD Encodes each digit of a decimal number into 4 digit binary form.

Each decimal digit is indiviidually converted to oits binary equivalent

For Example : 146 , the decimal degits are replaced by 0001 , 0100 and 0110 respectively

Addition

1 0 = 10 is binary value of 2 2

+1 1 = 11 is binary value of 3 + 3

---------- -----------

1 0 1 5 Ans

Subtraction

1 1= binary value of 3 3

- 1 0 = binary value of 2 - 2

--------- -----------

0 1 1 Ans

6 0
3 years ago
If a program compiles fine, but it produces an incorrect result, then the program suffers from _______________.
tatiyna
In my answer I am making an assumption that there is no runtime error, if there is then the error is “a run-time error”.

The answer is the program suffers from a Logic Error
5 0
2 years ago
Other questions:
  • Which of the following correctly describes the function of an IP address?
    7·1 answer
  • Describe how using active listening at work can help you be a better employee.
    15·1 answer
  • What kind of energy transformation occurs in a gasoline-powered car?
    14·1 answer
  • When developing e-business systems, an in-house solution usually requires a ____ for a company that must adapt quickly in a dyna
    11·1 answer
  • In the code segment below, assume that the int variable n has been properly declared and initialized. The code segment is intend
    5·1 answer
  • Ohanians “great big secret” is that:
    8·1 answer
  • Can you be my friend plz
    9·1 answer
  • A style sheet consists of CSS ______________________ that specify the layout and format properties to apply to an element. *
    13·1 answer
  • Phishing (pronounced fishing) is malware sent through e-mail that looks like a legitimate message from a trusted sender. The goa
    10·2 answers
  • Your connection to this site is not secure how to fix.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!