1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Digiron [165]
3 years ago
9

Write two examples of hard copy output?​

Computers and Technology
1 answer:
amid [387]3 years ago
7 0

if you are asking for hard copy output devices, then two examples would be

printers

plotters

if you are asking for types hard copy documents then two examples would be

letter

card

You might be interested in
Which of the following is a proprietary OS for desktop and laptop computers?
Leni [432]

Answer:

That would be Windows.

Explanation:

If you have any questions feel free to ask in the comments - Mark

Also when you have the chance please mark me brainliest.

3 0
3 years ago
You are the leader of your school's Go Green Club, which supports environmentally friendly choices and lifestyles. Your club wil
miskamm [114]

Answer:

(Answers may vary.)

My Considerations

The Go Green Club has a total of 100 members. I plan to photograph each of them in front of our club's "Go Green" sign. I have a deadline of 30 days to deliver the ID cards. Therefore, I have to ensure that all the cards are printed and ready for delivery in 20 days, with 10 days of buffer time (in case the cards require any edits or changes). Additionally, after I have submitted the draft for review, I will need the coordinator's final approval on the design and layout of the ID card.

Hardware Requirements

  • a desktop computer or laptop with adequate memory to run the software to create the ID cards
  • some external storage devices, such as pen drives and DVD disks, to share the design and layout for the coordinator to review; I will also need these devices to store the final digital file for print
  • a color scanner to scan hand-drawn artwork and signatures, which I will place on the ID card
  • a digital camera to capture photos of members, and to transfer them to the computer/laptop
  • a printer to make hard copies of the cards.
  • Software Requirements

I intend to use Scribus to create the ID cards because it is a free DTP application, and has most of the common features I'd need to create an ID card.

Formatting Techniques

  • I plan to use the following techniques to design the club ID cards.
  • I'll use the landscape or horizontal orientation. This will enable proper spacing for the ID card elements.
  • I'm planning to use a card measuring 3.370 inches × 2.125 inches. A card this size will ensure that all the elements of the card are visible.
  • I am planning to place the club logo on the top left corner, because the eye normally follows the path of the letter Z. This'll help the viewer to see the logo and identify/recognize the club.
  • Next I'll place the club name; I'll use the top-center alignment and also vertically align it to the logo. I'll use the sans serif font for the club name.
  • Following the Z-path rule, I'll place the member's photo to the right and the member's name under the photo. In this position, the photo and the name will be visible, and will not get mixed up with other elements. I'll print the member name with a serif font.
  • Finally, again in line with the Z-path rule, I'll position the club seal and the club director's signature at the right lower bottom. Although these elements are essential on an ID card, they do not require as much viewer attention as the club logo, name, and member photo.

Explanation:

I used Canva for this card.

8 0
3 years ago
Which trait can be a positive or negative?
N76 [4]

Answer:

Prejudice can be either positive or negative.

4 0
3 years ago
As we have seen in this chapter, public-key cryptography can be used for encryption and key exchange. Furthermore, it has some p
Savatey [412]

Answer:

Disadvantages of public key cryptography is that : Assymetric cryptography is slower than the private key cryptography.

Explanation:

We are dealing with big data applications most of time. Almost all applications are data intensive. Private key cryptography which is also known as symmetric cryptography. Symmetric cryptography based systems are faster. Since there is no key transmitted with the data, encrypted data can be transferred over the channel or session even if the path is vulnerable or have chances of interception as the chances of decrypting the data is almost impossible.

Also, The identity of the receiver is guaranteed using the password based authentication used by symmetric crypto systems. Only the trusted receiver who has the access to the secret key can only decrypt the payload

Public Key Cryptography is slower than private key cryptography. Today’s application’s are data intensive. In case of data intensive applications , encrypting huge data will take a lot more time than that of symmetric key cryptography. Whenever Bulk data transmission is needed symmetric key cryptography is preferred. Secret key based crypto systems have proven to be more faster than any currently available assymetric key based crypto systems.

7 0
3 years ago
Sarah stores data electronically.
attashe74 [19]

Answer:

Always back up your data. Prevention is the best protection.

Diversify your backups. You always want more than one backup system.

Encrypt sensitive data. Data is not always encrypted even when it's on a backup tape.

Address data security.  

Use anti-virus and email security.  

Trust the professionals

Explanation: <u>HOPE IT HELPS YOU</u>

3 0
3 years ago
Other questions:
  • Using a pin or password in addition to tpm is an example of what type of authentication?
    13·1 answer
  • Which of the following statements is false? a. Racks and bins are examples of storage equipment. b. Automation refers to equipme
    9·1 answer
  • You receive a phone call from a co-worker telling you that "the network is down." Just as you are about to look into the issue,
    11·1 answer
  • A company uses DHCP servers to dynamically assign IPv4 addresses to workstations. The address lease duration is set as 5 days. A
    6·1 answer
  • One lap around a standard high-school running track is exactly 0.25 miles. Write a program that takes a number of miles as input
    5·2 answers
  • An Internet Service Provider (ISP) is a company that builds the routers and wired connections that allow individuals to access t
    12·2 answers
  • 50 POINTS<br><br>Question linked in file below.
    5·1 answer
  • Which IDEs support multiple high-level programming languages? Select all that apply.
    14·2 answers
  • Kylee needs to ensure that if a particular client sends her an email while she is on vacation, the email is forwarded to a
    5·1 answer
  • ¿Cuál es la diferencia entre una plataforma educativa y una tutoría?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!