1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ksivusya [100]
3 years ago
10

Refer to the image on the right. Then, using the drop-down menu, identify the correct printer type. A: inexpensive home printer

that sprays ink onto paper _____. B: expensive business printer that lays powdered ink onto paper _____. Inkjet or laser

Computers and Technology
1 answer:
Ivanshal [37]3 years ago
6 0

Answer:

1st Option: Inkjet

2nd Option: Laser

Explanation:

Got it right on Edge 2020

You might be interested in
What are some programs that you have used that have condition-controlled loops and count-controlled loops?
gladu [14]

Some programs that we have used that have condition-controlled loops and count-controlled loops due to the following reasons.

Explanation:

Condition-controlled loops

A program could be made more intelligent by programming it to avoid hazards. For example, if the robot vehicle is 3 cm from the edge of the table and you tell it to move forwards 5 cm, it will drive off the edge of the table. To stop this from happening, you might write a condition-controlled loop like this:

move forward

repeat until (touching table edge)  

Condition-controlled loops can be used to add a high degree of intelligence to a computer system.

Count Controlled Loops

A count controlled loop is a repetition  structure that iterates a specific number of  times

You can write a count controlled loop using a

while() loop.

For example:

counter = 0

while counter < 5:

print (“This will print 5

times”)

counter += 1

8 0
3 years ago
What is the chief ethical concern concerning all the new sources of data available through new technological means like internet
Kryger [21]
The chief ethical concern is "Privacy". 

A negative aspect of an enormous number of sources available on internet is the concerns about privacy. Web privacy includes the privilege or command of individual protection concerning the sorting, re-purposing, arrangement to outsiders, and showing of data relating to someone through the Internet.Internet security is a subset of data privacy. Privacy concerns have been enunciated from the beginnings of substantial scale PC sharing.
6 0
3 years ago
Which procedure is recommended when cleaning inside a computer? Clean the hard drive heads with a cotton swab. Hold the CPU fan
ddd [48]

Answer:

Hold the CPU fan so that it won't spin and blow this with compressed air.

Explanation:

While cleaning the computer system from the inner side then we have to follow some steps.

  • Firstly, shut down the system properly and remove it from the power supply.
  • Then, open the cabinet of the computer system.
  • Then, clean the internal parts of the system through simple air pressure and hold the CPU fan during that time to avoid spinning.
  • Clear the dirt layer using the can of compressed air over the cabinet fans.
8 0
3 years ago
Explain the characteristics of 1st generation computers​
levacccp [35]

Explanation:

i hope this is the right answer

!st generation computers were more big and bulky and you for sure could not bring them around everywhere.

8 0
3 years ago
What is a perfect hashing function?
antiseptic1488 [7]

Answer:

First we understand what is hash function.A hash function is mostly used in Hashmaps. It maps different keys to a set of values.There may occur a case when we have same key but different values.This case is called collision.So we have to use different collision handling techniques that are open addressing and separate chaining.

A perfect hash function maps key-value pair such that there are no collisions.

3 0
3 years ago
Other questions:
  • What can be determined from this selection? Check all that apply. The Tax Info worksheet is currently being viewed. There are th
    6·2 answers
  • ________ is used to store programs and instructions that are automatically loaded when the computer is turned on.
    14·1 answer
  • For connection to place on any network you must have a set of standards?<br> O True<br> O False
    8·1 answer
  • What laptops can you get for 2500$ and should mostly using Microsoft applications.
    14·2 answers
  • Which database item would show details such as a customer’s name, their last purchase, and other details about a customer?
    11·2 answers
  • Which of the following is true of Chinese Opera: Two opera centers emerged Beijing and Yangzhou 300-400 forms of opera arose in
    10·1 answer
  • What key should i press to leave the cell as it orginally was
    9·1 answer
  • Computer privacy typically occurs when which of the following is violated?
    6·1 answer
  • Even though jdoe and jrock have the same password (i.e., hacker), their password hashes in the /etc/shadow file are different. W
    15·1 answer
  • _____ provides the best video resolution. *<br><br> VGA<br> HDMI<br> USB<br> DVI
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!