1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tresset [83]
3 years ago
12

You have been having issues with your printer, so you decide to learn more about how the printer works. You learn that if you re

place your printer with a new one, you will have to install a(n) ______ to your computer.
Computers and Technology
1 answer:
FromTheMoon [43]3 years ago
8 0

Answer:

printer

Explanation:

i think im right

You might be interested in
Which Internet protocol (IP) packet fragmentation header field specifies where the fragment belongs in the original datagram
Yanka [14]

An Internet protocol (IP) packet fragmentation header field which specifies where the fragment belongs in the original datagram is the fragment offset.

<h3>What is the TCP/IP model?</h3>

The TCP/IP model is known as the Internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model and it can be defined as a standard framework that is designed and developed for the transmission (prepare and forward) of information on the Internet.

In the TCP/IP model, a fragment offset simply refers to an Internet protocol (IP) packet fragmentation header field which is used to specify where the fragment belongs in the original datagram.

Read more on Internet protocol here: brainly.com/question/17387945

#SPJ1

8 0
2 years ago
Can any existing directory beneath the system root directory be used as a mount point?
musickatia [10]
<span>Yes.
   A mount point mounts a capacity gadget or filesystem, making it available and appending it to a current registry structure.
    While an umount point "unmounts" a mounted filesystem, illuminating the framework to finish any pending read or compose activities, and securely confining it.</span>
7 0
3 years ago
What is the final amount stored in value if the computer selects 17 as the
nadya68 [22]

Answer: -17

Explanation:

Our random number is 17. Let's go through line by line.

  1. value is a random number picked which is 17
  2. valueB = 17 / 2 = 8.5
  3. If value is greater than 0 AND value has a remainder of 1, we will set the value to value* -1.
  4. Value is now 17 * -1 = -17

Let's quickly calculate value mod 2. 17 % 2 = is 1. If you're wondering how we did that, the remainder after dividing 8 into 17 twice is 1, because 17 - 16 = 1.

We stop after line 4 because we stop the conditional statement after one condition is filled.

6 0
3 years ago
. An operating system is: *
Artemon [7]

Answer:

3. System Software

Explanation:

An operating system is a special type of system software. It controls and co-ordinates overall of the computer.

4 0
3 years ago
P6. In step 4 of the CSMA/CA protocol, a station that successfully transmits a frame begins the CSMA/CA protocol for a second fr
Karo-lina-s [1.5K]

Answer:

To avoid collision of transmitting frames.

Explanation:

CSMA/CA, carrier sense multiple access is a media access control protocol of wireless networks that allows for exclusive transmission of frames and avoidance of collision in the network. When a frame is not being sent, nodes listening for an idle channel gets their chance. It sends a request to send (RTS) message to the access point. If the request is granted, the access point sends a clear to send (CTS) message to the node, then the node can transmit its frame.

Many nodes on a wireless network are listening to transmit frames, when a frame is transmitting, the node has to wait for the access point to finish transmitting, so it sends a RTS message again to exclusively transmit a second frame.

8 0
4 years ago
Other questions:
  • Which is NOT a way the network operating sys-
    6·1 answer
  • ______________is a collection of technologies for abstracting the details of how applications, storage, network, and other compu
    6·1 answer
  • We can harden a host by: a. Limiting physical access to it b. Turning off unnecessary services c. Installing patches d. All of t
    8·1 answer
  • For Java, a program is converted from a text file of code into an executable file by the process of ?
    11·1 answer
  • The seven basic internal components found in a computer tower
    9·1 answer
  • The question of ________ arises when considering the way in which online marketers gather consumers’ information over the Intern
    6·1 answer
  • Creating Classes
    12·1 answer
  • What is the best use of network in homes
    15·2 answers
  • Which UPPER function is written so that all text in cell B4 will be capitalized? O=UPPER(B4) O=UPPER[B4] O UPPER B4 O=UPPER
    6·1 answer
  • Different between I time and E time​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!