1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ANEK [815]
4 years ago
14

Most printers are plug and play compatible and must be manually configured when they are plugged into the system.

Computers and Technology
2 answers:
nikdorinn [45]4 years ago
8 0

Answer:

False

Explanation:

Plug and play devices are computer peripheral devices that can be used immediately, with little or no necessary configuration when plugged or connected to the computer system.

Printers are mostly electronic devices used as an output of a hard copy of a computer system application document. They are not part of the computer system (peripheral devices). They come with installation disk which a computer must install, in order to be able to use the printer.

Yes they are peripheral devices, but they are not plug and play devices since its software must be installed on the computer, to use it

Morgarella [4.7K]4 years ago
3 0

Answer:

The statement is: False.

Explanation:

Plug and Play or PnP devices are those which by just connecting them into a server are immediately recognized by the Operating System (OS). Though, some other devices like, printers, and additional monitors need a software (driver) to be installed so they can be fully used.

You might be interested in
An online retailer has developed an algorithm to provide personalized recommendations to shoppers. Which form of IPR protects th
Helen [10]

Answer:

should be B.

Explanation:

If not then Im sorry

5 0
3 years ago
_____ can be used to convert digitized documents into ASCII (American Standard Code for Information Interchange) text that can b
solniwko [45]

Answer:

Optical Character Recognition

Explanation:

Optical Character Recognition is a method that is used to read character and bar codes. They convert scanned image into digital format. In other words ASCII text can be formed when a digitized document is converted.OCR is a method that convert document into word.

Here are some OCR tools which convert digitized format into machine readable text.

  • Microsoft Document
  • Microsoft One Note

8 0
3 years ago
Select the correct answer. Hudson has to maintain confidential college data in a spreadsheet. He needs two team members to help
AlladinOne [14]

Answer:

B. Protection

Explanation:

It is the protection tab. We can protect a cell from being changed or altered by any other user of the excel sheet using the protection tab. We only need to select the cell, and right-click, Now choose the protection tab, which will be shown. And now select locked and click ok. This cell cannot then be changed by anyone else other than you. Hence, the correct option here is the protection tab.

4 0
3 years ago
What are the 3 biggest advancements in computers?
Georgia [21]

Answer:

abacus . Mesopotamia or China, possibly several thousand years BCE. ...

binary math . Pingala, India, 3rd century BCE. ...

punched card . Basile Bouchon, France, 1725. ...

Explanation:

:)

6 0
3 years ago
These statements describe guidelines for the use of tables in presentations.
In-s [12.5K]

Answer:

(E)

Explanation:

I think it's E because it's the only answer that makes sense I guess!

4 0
3 years ago
Read 2 more answers
Other questions:
  • You are working on an excel table and realize that you need to add a row to the middle of your table. what is one way to do this
    12·1 answer
  • ?Which programmer designs programs for applications executed on the Internet?
    11·2 answers
  • You would like to conduct a survey and ask your web page visitors to indicate the computer operating systems that they use. Each
    5·1 answer
  • In the early days of photography, cameras were limited to professional photographers because of the knowledge needed to work the
    9·2 answers
  • How do you open an application on the macOS?
    11·2 answers
  • Brain for free 12628397
    14·2 answers
  • Which of the following processes allows animators to use computers to input human movement that can later be transformed to crea
    15·2 answers
  • How can you protect your information when using wireless technology
    10·1 answer
  • Which of the following are exclusively associated with copyright protection
    5·2 answers
  • The rules of a programming language constitute its__________________
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!