1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yaroslaw [1]
2 years ago
7

What is a nonimpact printer that creates characters and images with dots by using a drum and toner called?

Computers and Technology
1 answer:
rusak2 [61]2 years ago
5 0

The answer is Laser Printer.  It is a non impact printer that creates characters and images with dots by using a drum and toner.  The main advantages of laser printers are speed, precision and economy. A laser can move very quickly, and because the laser beam has an unvarying diameter, it can draw more precisely, without spilling any excess ink.

You might be interested in
Identify a logical operation (along
tankabanditka [31]

Answer: Provided in the explanation section

Explanation:

The Question says;

Identify a logical operation (along

with a corresponding mask) that, when

applied to an input string of 8 bits,

produces an output string of all 0s if and

only if the input string is 10000001.​

The Answer (Explanation):

XOR, exclusive OR only gives 1 when both the bits are different.

So, if we want to have all 0s, and the for input only 10000001, then we have only one operation which satisfies this condition - XOR 10000001. AND

with 00000000 would also give 0,

but it would give 0 with all the inputs, not just 10000001.

Cheers i hope this helped !!

3 0
3 years ago
Entrepreneur Employing Mobile Enterprise Apps AACSB Standards: Systems and Processes Australian-based entrepreneur Nathan Tuckwe
insens350 [35]

The factor that is helpful when adding new inventory and not among the Accounting Functions is the audit function.

<h3>Why is the audit function important?</h3>

The role of internal audit is known to be one that tends to give some measures of independent assurance that is need by a firm or an organization in terms of risk management, governance, as well as internal control processes to be able to operate effectively.

Note that an internal audit is said to be carried out objectively and set up to improve and make good an organization's business practices.

Hence, The factor that is helpful when adding new inventory and not among the Accounting Functions is the audit function.

Learn more about audit function from

brainly.com/question/24170807

#SPJ1  

4 0
1 year ago
Robots are increasingly being used in caring roles. Discuss the ethical and cultural implications of this trend
vekshin1
Using more robots means less human contact which means declining social skills, and heavier dependence on technology. And using more technology is expensive.
4 0
3 years ago
When should you try to photograph reflections on bodies of water?
Wewaii [24]

Answer:  C. although a rainy day (A) would make it more aesthetic

6 0
3 years ago
The penalties for ignoring the requirements for protecting classified information when using social networking services are ____
Sloan [31]

Answer: the same as

Explanation: Sensitive information are usually tagged as classified and as such only individuals with the necessary security clearance have access to information of these sort. The sensitivity of these information stems from the damage that could ensue from it's leakage. Those found culpable could be sued for various degree of criminal offenses. The rules binding the rules, regulation and protection of these sensitive information is similar to those binding on other dissemination methods. This may be due to the degree of chaos and it's leakage through any channel of dissemination could be damaging. Penalties if found guilty may range from imprisonment, demotion, termination of appointment and so on.

3 0
2 years ago
Other questions:
  • 4. When you're working with a word processing document and you press the Del key, what happens?
    8·2 answers
  • What is Software? Write the functions of Software?​
    11·1 answer
  • Which delivery model is an example of a cloud computing environment that provides users with a web based email service ?
    9·2 answers
  • 2-3 Calculating the Body Mass Index (BMI). (Programming Exercise 2.14) Body Mass Index is a measure of health based on your weig
    13·1 answer
  • Why are computer messages encapsulated?
    13·1 answer
  • Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
    10·1 answer
  • Consider Ron’s budget. How much money does Ron have left over each month?
    9·2 answers
  • 5)What are the differences in the function calls between the four member functions of the Shape class below?void Shape::member(S
    8·1 answer
  • You are a database administrator. Chantelle comes to you asking for help on how to access all the data in one row of the databas
    11·1 answer
  • How can a user begin to work with a new sheet in excel?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!