1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lesya692 [45]
3 years ago
14

Some printers spray ink, while others use heat or lasers to create images.

Computers and Technology
2 answers:
anzhelika [568]3 years ago
8 0

Answer:

hard - copy

Explanation:

that's because my printers does this

and its soo cool

puteri [66]3 years ago
5 0
The answer is hard-copy
You might be interested in
What type of cable is used to connect a workstation serial port to a cisco router console port?
butalik [34]

a <span>Ethernet-<span>Cable is a how to put it together</span></span>

<span><span /></span>

6 0
4 years ago
What term is used to record successful and unsuccessful access attempts
MArishka [77]
I think it is called an audit trail. 
6 0
4 years ago
What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130
Tatiana [17]

Answer: Eight

Explanation:

A class B address is 255.255.0.0. We need to borrow 8 bits from the network portion to have atleast 130 host per subnet.

11111111.00000000.00000000.00000000

8 0
3 years ago
Among the second generation home console companies,which managed to come out on top
crimeas [40]

Answer:

The second generation of home consoles occurred from (1976-1988) at this time the most popular and consoled regarded as best was the Atari 2600

Explanation:

answer from Cligon768 on this site

3 0
4 years ago
__________ implements a security policy that specifies who or what may have access to each specific system resource and the type
malfutka [58]

Answer: Access control

Explanation:

Access control implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

A typical example of this is in ERPs where access controls defines what access codes a process owner has and what access a reviewer and an approval has. Where a personnel has access to carry out a transaction, review and approve the transaction, access controls are said to be deficient.

The right answer is Access control

Hope this helps!!

6 0
3 years ago
Other questions:
  • Please reply only in CORAL. I am not sure how to get the numbers between the negative version and positive version of the input
    10·1 answer
  • A ________ is a container that provides quick access to elements at the front and the back of the list
    6·1 answer
  • [15 points] 3.2 Lesson Practice (holy marry mother of joseph)
    7·1 answer
  • The hardware that takes the input data and works with it
    7·1 answer
  • Which of the following statements about arrays are true?
    10·1 answer
  • 58:30
    8·1 answer
  • Types of computer that we use in our daily life​
    13·2 answers
  • Which of the following is NOT a semantic reason for using header tags
    7·1 answer
  • Think of a genre (science, music, math, sports, video games, etc.) and create at least 10 questions. You can decide whether you
    12·2 answers
  • If you wish to install a new OS without disturbing the old one so that you can boot to either OS, what type of boot setup should
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!