1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Brums [2.3K]
3 years ago
7

Discuss the impact printer and its types in detail?

Computers and Technology
1 answer:
Delvig [45]3 years ago
5 0

Answer:

mpact printers create an image by using some mechanism to physically press an inked ribbon against the page, causing the ink to be deposited on the page in the shape desired.

Difference between Impact and Non-Impact Printers:

Impact Printer Non Impact Printer

Have banging noise of needle on paper Works silently

Dot-matrix printer, Daisy wheel printers, line printer are examples . inkjet printers, photo printers, laser printers are examples .

Explanation:

You might be interested in
After separating from Mexico, Texas passed laws that made it harder for slave owners to _____________ slaves.
baherus [9]

Answer: b.

Explanation:

8 0
2 years ago
Read 2 more answers
A technician receives an invalid certificate error when visiting a website with port 443 enabled. Other computers on the same LA
amm1812

Answer:

Option (A) is the right answer.

Explanation:

According to the scenario, the user system is giving the error of invalid certificate while other users on the same network do not report any error, which means that there is some problem in a particular system.

Date and time can also be one of the main cause of this error because wrong date and time creates problem in surfing many websites by giving certificate error.

Hence the most appropriate answer is option (A).

While other option are wrong because of the following reasons:

  • UEFI boot mode is mainly used in booting the operating system and has no connection with network.
  • Logon time is also wrong because if the problem is with the login server, it can not give certificate error.
  • User access control is also not correct because it is used to control the access of the user.
7 0
2 years ago
How to bypass a Lightspeed and Rocket Filter blocked website without being a admin and without downloading extensions? Must incl
AVprozaik [17]

You really cant without being admin. Calm yaself child

6 0
2 years ago
What are the four different orchestral instrument families?
natka813 [3]

Answer:

Gutair

Violen

cello

Double Brass

Harp

Explanation:

7 0
3 years ago
Read 2 more answers
What is a computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or
Harman [31]

Answer:

The correct answer to the following question is Drive-by hacking .

Explanation:

Drive-by hacking is the type of hacking which comes under the cyberterrorism.

Drive-by hacking is the hacking where the hackers can access their data and steal their data, use their network services from some "safe" distance without going inside the company or an organization.

Drive-by download is the type of download of the malicious code into your mobile devices or the computers which occur by designed and it leave you to the cyberattack.

7 0
3 years ago
Other questions:
  • Again, consider what you believe to be the goal of performing a penetration test. Why would you worry about doing any privilege
    14·1 answer
  • You are an administrator for contoso.com. you have two servers called server1 and server2 that run windows server 2012 and have
    9·1 answer
  • If you want an app to reach the largest possible audience, which two platforms should you use?
    7·1 answer
  • A URL suffix is called a domain name.
    11·1 answer
  • Please Do Solve it guys...
    6·1 answer
  • Debbie’s colleague hasn’t provided her the required details to complete an important report. She is upset by this, and she sends
    14·2 answers
  • A(n) __ is a list of main points and sub-points of a topic to include in a presentation
    14·2 answers
  • What best describes presentation software?
    14·1 answer
  • Which type of storage disk and disk drive can you use in the given situation?
    12·1 answer
  • A period in which unemployment is low, business produces many goods and services, and wages are good is called ______.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!