1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andre [41]
4 years ago
12

How to connect to my wireless printer for dummies?

Computers and Technology
1 answer:
Arte-miy333 [17]4 years ago
8 0
It depends on the printers brand as there are a broad range of wireless printers offering all sorts of connections.

Generally speaking, you would want the printer to connect to the network (LAN) this could be done on the printer. Refer to the printer's manual. I think you can also connect it via the computer. Just find it on the computer on 'find printer' in your computers settings. Specify the printers name in order to this.
You might be interested in
What's the difference between joystick and mouse​
lyudmila [28]

Hey there! This is the difference between a joystick and a mouse:

A mouse is moved back and forth and up and down by a person's hand. The mouse device moves across the table surface. A joystick on the other hand stays stationary and is basically composed of a base and a stick. A vertical stick is held in the hand and tilted forward backward left and right. But the only thing that moves with a joystick is the center stick.

I hope this helps you out! Let me know if you have any questions!

5 0
3 years ago
Read 2 more answers
Discuss in detail why you need to use a write blocker (either hardware or software) in your examinations, whether for a criminal
dolphi86 [110]

A write blocker is any tool that permits read-only access to data storage devices without compromising the integrity of the data. A write blocker, when used properly, can guarantee the protection of the data chain of custody. NIST‘s general write blocking requirements hold that:

<span>The tool shall not allow a protected drive to be changed.The tool shall not prevent obtaining any information from or about any drive.<span>The tool shall not prevent any operations to a drive that is not protected.</span></span>
8 0
3 years ago
When installing wire into a terminal it is important the stripped part of the wire
lianna [129]
D is the answer.......
5 0
3 years ago
You want to use your Windows workstation to browse the websites on the internet. You use a broadband DSL connection to access th
xxTIMURxx [149]

Answer:

IP

Explanation:

8 0
3 years ago
Which is a difference between the systems development life cycle (SDLC) and extreme programming (XP)?
Wittaler [7]

Answer:

the correct answer is "B"

Explanation:

the Systems development life cycle (SDLC) is a complete development process for a new product without giving any chance for alteration or improvement, Whereas,

extreme programming (XP) uses a software programme that is coded to allow for alteration. the product is continously modify until its meet customers satisfaction.

SDLC is seen as and archaic method of product development while XP is a new technology used by most company.

therefore, the SDLC models develops an entire system at once, where as XP uses incremental steps to improves an information system quality.

6 0
3 years ago
Other questions:
  • Prove that for every nfa with an arbitrary number of final states there is an equivalent nfa with only one final state. Can we m
    8·1 answer
  • Write a method named lastFirst that accepts a string as its parameter representing a person's first and last name. The method sh
    13·1 answer
  • I want to know all part of computer system?
    9·2 answers
  • Pinterest, a visual bookmarking Website, logs more than 14 terabytes of new data each day, which means its storage needs are con
    10·1 answer
  • To complete this quest, answer the following questions in the submission box below. Make x an array going from 0 to 100 by steps
    15·1 answer
  • Consider the following code.
    7·2 answers
  • I ate five M&amp;Ms: red, green, green, red and yellow. Only these three colors are possible. I assume that p(yellow)=3p(green)
    9·1 answer
  • From the time users first visit a new website, or view a new media piece, how much time will they spend on the site before they
    10·1 answer
  • ________ helps in determining the cause of a security threat in an incident response plan. Question 7 options: A) Restricting sy
    5·1 answer
  • Chantal has configured the network at her company's new headquarters with a number of VLANs. All devices joined to the individua
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!