1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Digiron [165]
3 years ago
9

Write two examples of hard copy output?​

Computers and Technology
1 answer:
amid [387]3 years ago
7 0

if you are asking for hard copy output devices, then two examples would be

printers

plotters

if you are asking for types hard copy documents then two examples would be

letter

card

You might be interested in
Bonjour ma question est: expliquer comment fonctionne une calculatrice qui ne contient pas une pile. Pouvez-vous m'aider?
larisa [96]

Answer:

Tout calculateur électronique ou numérique nécessite une source d'alimentation pour fonctionner, avec son circuit configuré à la porte logique requise liée aux touches d'entrée et à l'écran de sortie.

Explanation:

Les calculatrices sont des appareils utilisés pour les calculs arithmétiques. Au 19ème siècle, les calculatrices étaient mécaniques et n'utilisaient pas de batterie, elles étaient encombrantes et utilisaient des tiges et des engrenages dans leur fonctionnement. Les calculatrices récentes sont électroniques, alimentées par une batterie. Ils comprennent un circuit électronique configuré à sa porte logique requise pour le calcul, un bouton pour l'entrée et un écran pour la sortie du calcul.

6 0
3 years ago
Where can I learn how you hack?​
morpeh [17]

Answer:

www.udemy.com

5 0
3 years ago
Read 2 more answers
How long before a speech should you begin practicing?
hichkok12 [17]

Answer:

D

Explanation:

4 0
3 years ago
Read 2 more answers
Apart from confidential information, what other information does NDA help to outline ?
Vikki [24]

There isn't enough info for me to answer this with complete confidence XD.

6 0
4 years ago
If you were the manager at a firm which deals with sensitive information of its customers, employees and other stake holders, ho
Rzqust [24]

Answer:

explanation below

Explanation:

Management controls are some of the techniques and mechanisms that can be put in place to implement security policies – which ensure information and information systems are protected.  These controls are not only used by managers but can be exercised by selected users.  

These controls must be put in place to cover all forms of information security, physical security and classification of those information.  

5 0
3 years ago
Other questions:
  • A computer abuse technique called a ____ involves inserting unauthorized code in a program, which, when activated, may cause a d
    11·1 answer
  • What is master slide and tell about master slide
    6·1 answer
  • Describe how you center text.
    7·2 answers
  • _________ is critical to Amazon's success.<br><br> SCM<br><br> JIT<br><br> ERP<br><br> VMI
    9·1 answer
  • In Alphatech Systems, email software screens incoming messages by organizing them into mailboxes and identifying junk mail. As a
    13·1 answer
  • Write a program that will find the smallest, largest, and average values in a collection of N numbers. Get the value of N before
    13·1 answer
  • ___________ is related to mass, but also includes the gravitational pull of the Earth.
    14·1 answer
  • LaShawn would like to post photos in a social media app, but the program needs to be modified in order to display a greater vari
    12·2 answers
  • What is a thoughtware​
    7·1 answer
  • What relationship do MP3s and MP3 players have with video files?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!