Answer:
laser
Explanation:
These are well known printer types now. Let's review how they work to determine in which does heat plays a role.
inkjet: inkjet printers are printer throwing ink at the paper in the form of little drops. No heat involved here.
impact: That's the oldest technology, where a printing head is moving left and right to punch a printing ribbon and transfer ink onto the paper. No heat involved.
3D: 3D printers don't usually use paper... as they use other materials to create a 3D representation of a model. Heat is involved in the melting of the material before it's placed on the building model. But no paper involved here.
laser: laser printers are working very much like a photocopier machine... memorizing the pattern to be printed, then transferring it onto paper... using heat.
Answer:
case-based.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.
Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.
A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;
1. Planning.
2. Analysis.
3. Design.
4. Development (coding).
5. Testing.
6. Implementation and execution.
7. Maintenance.
A case-based reasoning application refers to a knowledge-based system that is designed and developed to use previous case scenarios (similar past problems) to interprete or proffer a solution to a problem.
In design and implementation of any case-based reasoning application, there are four (4) Rs involved: retrieve, reuse, revise, and retain.
Answer:
It is D : It might be getting hit with a DDoS attack
Explanation:
Thank you for asking and I don't want any thanks. I just want to help. Oh and do you play Ro blocks? :D
Sry if I spelt it wrong, they censored it
Ro blox
The answer is False
If you have not made any changes to your title such as changing ownership, you can apply for a duplicate title. Provided your vehicle has been stolen, lost, or the lien on the car has been satisfied, you may stand a chance to obtain a duplicate title. However, you may be required to provide certain information like the vehicle ID number and others and pay a fee
.
Answer:
SYN flood attack.
Explanation:
The transport layer of the OSI network model is the four layer is the model. It provides a medium of transportation between two computers in the network. It segments packets to smaller chunks for easier transmission. The PDU of the layer is called segment.
UDP and TCP are examples of the protocols found in this layer
The UDP is a connectionless transmission while the tcp is connection oriented, which means that it must establish a connection for transmission to take place. It is susceptible to SYN flood attacks because it reply to SYN with and ACK message. For this reason, an attacker could flood all of it ports with an ICMP request echo message.