1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Eva8 [605]
2 years ago
11

Complete the add repair method! (Will give the brainiest)

Computers and Technology
1 answer:
Masteriza [31]2 years ago
6 0

Answer:

Give three(3) difference between Dot-matrix printer and the Daisy-wheel printer

You might be interested in
PLZZ HELP!! ITS FOR A TEST!! Third generation computers were set apart because of this invention. A) microprocessors B) transist
Vladimir [108]

Answer:

A. Invention of microprocessor

Explanation:

The third generation of computer itself was based on the technology of integrated circuits (shorten as IC).

It lasted for about 6 years and was brought to an end with the advent of the fourth generation of computers which was based on microprocessors.

Hence, option A answers the question.

4 0
3 years ago
Read 2 more answers
1. According to the Department of Commerce, _________ percent of single moms in the US qualified as poor.​
Allisa [31]

Answer:

. According to the Department of Commerce, 34.0% percent of single moms in the US qualified as poor.​

Explanation:

8 0
3 years ago
Uso de las redes sociales como el uso de una impresora en casa se satisfacen estás tres etapas
Svetradugi [14.3K]

Question: what question is this?

7 0
2 years ago
Each week, the Pickering Trucking Company randomly selects one of its 30 employees to take a drug test. Write an application tha
Sati [7]

Answer:

Following are the program to this question:

import java.util.*; //import package

public class Main //defining class

{

 public static void main(String[] args) //defining main method

 {

   int testedEmployee; //defining integer variable

   for(int i = 1;i<=52;i++) //defining loop that counts from 1 to 52  

   {

     testedEmployee = 1 + (int) (Math.random() * 30); //using random method that calculate and hold value

     System.out.print(testedEmployee+"\t"); //print value

     if(i%4 == 0)//defining codition thats checks value is divisiable by 4  

     {

       System.out.println(); //print space

     }

   }

 }

}

Output:

please find the attachment.

Explanation:

In the given java program, a class Main is declared, inside the class, the main method is declared, in which an integer variable "testedEmployee", is declared, in the next line, the loop is declared, that can be described as follows:

  • Inside the loop, a variable "i" is declared, which starts from 1 and stop when its value is 52, inside the loop a random method is used, that calculates the random number and prints its value.
  • In the next step, a condition is defined, that check value is divisible 4 if this condition is true, it will print a single space.

3 0
3 years ago
Match the following ____________________ is a situation where someone examines all the network traffic that passes their NIC, wh
earnstyle [38]

Answer:

1. Sniffing.

2. Sequence number.

3. Phishing.

4. Null session.

Explanation:

1. Sniffing is a situation where someone examines all the network traffic that passes their NIC, whether addressed for them or not.

2. A sequence number is a 32-bit number established by the host that is incremented for each packet sent. It can be used by a computer administrator or network engineer to reorder packets.

3. Phishing is the use of fraudulent e-mails or instant messages that appear to be genuine but are designed to trick users. Informations such as password, credit card details and other personal information can be gotten by an attacker through this process.

4. A null session is a connection to a Windows interprocess communications share (IPC$). A hacker can use a null session to gain unauthorized access to informations such as security settings, registry settings, username (User ID) about an end user.

7 0
2 years ago
Other questions:
  • The Fully Meets rating should be assigned when the spelling suggestion matches query intent
    11·1 answer
  • Choose the type of critical thinking demonstrated in the example:
    8·2 answers
  • When activating windows, which type of volume activation is used to activate multiple windows systems, but must be individually
    12·1 answer
  • Design a method for representing the state of a tic-tac-toe board in computer memory. can you fit your representation into three
    12·2 answers
  • A blank is the full web Address for particular website<br> (Computer technology)
    14·1 answer
  • PowerPoint allows you to input files from variety of sources, such as Microsoft access.
    6·1 answer
  • Determine whether the phrase below is a sentence or a fragment.
    12·1 answer
  • Danielle is analyzing logs and baselines of the systems and services that she is responsible for in her organization. She wants
    12·1 answer
  • Each drop-down menu.
    8·1 answer
  • If you are using a sprite for your MakeCode Arcade game, which code block
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!