1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlada-n [284]
3 years ago
13

16. Select the correct answer.

Computers and Technology
1 answer:
Helga [31]3 years ago
8 0

Answer: Plotter-- B

Explanation:

A Plotter is  sophisticated  printer that get commands from a computer and interprets them to draw high quality lines or vector  graphics on paper  rather than dots using one or several automated pens. This makes them useful in the area of  CAD , architecture drawings and engineering designs. The types of plotters we have include Drum Plotters, Flat Bed Plotters and Ink Jet Plotters.

You might be interested in
Pressing the Ctrl+Home keys moves the insertion point to the
rewona [7]
I'm going to go with A
5 0
3 years ago
Jill is setting up a presentation and wants to use a built-in equation, such as the area of a triangle. To insert this in her pr
Alex73 [517]
The mathematical operations/symbol/formulae can be inserted into MS powerpoint using equation editor. Just follow these steps:
1)click on the Insert
2) Select Object from the list
3) Select Equation Editor from the list and the dialog box of equation editor will open up. Now, write, edit your equation in this box. When you return back to powerpoint slide, the equation will come on the current slide, you are working on.
4 0
4 years ago
Read 2 more answers
Which of the following programs can open a bitmap file?
choli [55]
Windows paint can be used to open a bitmap file. Usually, when you have a picture, you can use that to edit it.
Also, on a side note, notepad is specifically used for html codes. 

Answer: Windows Paint
4 0
4 years ago
Read 2 more answers
Jennifer has to set up a network in a factory with an environment that has a lot of electrical interference. Which cable would s
jeka57 [31]

The answer is STP (Shielded Twisted Pair) cables .

Compared to Unshielded Twisted Pair, STP offers additional safeguards against Electromagnetic interference (EMI) and crosstalk. While UTP reduces some EMI, STP cables effectively block interference and ensure high-speed performance. STP cables have a metallic foil that cancels out electromagnetic interference. They are the preferred cables that protect against high-level EMI from, power lines, radar systems, or electromagnetic fields .



6 0
3 years ago
What is the easiest way to beat all of the fnaf games without getting killed and beating all of the nights?
MrRa [10]

Answer:

If you want the game to be "hard" be paranoid. If you are not scared, this game is simple. All you have to do is check your camera to pirate's cove to see if foxy is there. Otherwise, check the halls on your left and right. When Bonnie and/or Chica come, quickly close your doors and wait till they go away. Then, on night five, check the stage to make sure freddy has not moved. Night 5+ is the only real challenge.

Explanation:

My Strategy

Rythm is essential to surviving all the nights at Freddy Fazbears. Here is what I do.

First, check the light on the left.

If anyone is there close the door, or keep the door shut

If not, or after you have closed the door, move on to the next step.

Then, close the right door*.

Check the camera to make sure foxy has not moved.

If Foxy has moved, quickly shut the right door and check camera 2A. When your are pulled out of your camera, return to your camera and check on Foxy.

Check the right hall light.

If anyone is there close the door, or keep the door shut.

If no one is there, or you have the door shut, repeat all of these steps

5 0
3 years ago
Read 2 more answers
Other questions:
  • The binary search algorithm ________. will have a maximum number of comparisons equal to the number of elements in the array wil
    7·1 answer
  • Scavenging is a form of fraud in which the perpetrator uses a computer program to search for key terms in a database and then st
    14·1 answer
  • What term is used to describe the harassment of computer users through various forms of internet communications?
    5·1 answer
  • (True/False). If the definition of an IS is the medium for recording and storing data, and disseminating information, this would
    12·2 answers
  • Under which menu option of a word processing program does a callout appear?
    7·2 answers
  • The processor of a computer communicates to the other parts of the computer through a code that consists of what?
    9·1 answer
  • The length of the hypotenuse of a right-angled triangle is the square root of the sum of the squares of the other two sides. Wri
    7·1 answer
  • window operating system popularly known as. 1) character user interface. 2) computer user interface. 3) graphic user interface.
    15·1 answer
  • What command in cisco IOS allows the user to see the routing table
    5·1 answer
  • On a wireless network use _____ to ensure that only authorized client computers are able to access the wireless network.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!