1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maks197457 [2]
4 years ago
9

A(n) _____ is a common output device for hard copy.

Computers and Technology
1 answer:
Sidana [21]4 years ago
8 0
The answer is d it is d it is d I think I think, I’m not sure though
You might be interested in
A three-tier design includes a middle layer between the client and server that processes the client requests and translates them
devlian [24]

Answer:

a. True

Explanation:

The three tiers in a three-tier architecture are:

Presentation Tier: Occupies the top level and displays information related to services available on a website. This tier communicates with other tiers by sending results to the browser and other tiers in the network.

Middle Tier: Also called the application tier, logic tier, business logic or logic tier, this tier is pulled from the presentation tier. It controls application functionality by performing detailed processing.

Data Tier: Houses database servers where information is stored and retrieved. Data in this tier is kept independent of application servers or business logic.

5 0
3 years ago
There are two kinds of emotions: positive and negative. True False
fgiga [73]

Answer:

False

Explanation:

There are many emotions the human brain can experience

6 0
2 years ago
Read 2 more answers
What are the three fundamental principals of mnemonics??
olasank [31]
The three fundamental principles underlying the use of mnemonics are imagination, association and location
4 0
3 years ago
Read 2 more answers
What is a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowle
Stells [14]

Answer:

The answer is "Spyware".

Explanation:

Spyware is a supplementary program that is mounted on your customer computer and it transmits the data without authorization via the Internet. Its business includes ads, private data, and improvements in the user interface, which is why it has become recognized as the special adware class that collects and transmits user information over the web without the user's permission.

7 0
4 years ago
When you are printing handouts, which of these can you do?
erik [133]

Answer:

all of these

Explanation:

As we know that, at the time of presentation we need to print copy of handouts for the audience of the presentation.

All three steps are necessary because.

A. There may be huge number of audience, so to save paper we place more than one slides per page

B. The flow of presentation must be same on handouts as on your presentation slides.

C. There should be a copy of handout for every person who is sitting in your presentation

5 0
3 years ago
Other questions:
  • You can apply bold, italic, and underline styles to text. But why is it a good idea to use underline sparingly?
    13·2 answers
  • Walking paths across the part is represented by the equation why equals -4x - 6​
    9·1 answer
  • 1.Context clues can be used to determine the ________of an unfamiliar word
    5·2 answers
  • Extinction of a species is always a negative impact on the Earth.<br><br> True<br> False
    8·1 answer
  • The company currently runs 60 autonomous APs and has plans to increase wireless density by 50% in the near future
    13·1 answer
  • Which of the following best defines Monte Carlo simulation?a. It is a tool for building statistical models that characterize rel
    11·1 answer
  • How to create a distribution list in outlook?
    7·1 answer
  • Match the job description to the level of degree it requires.
    15·1 answer
  • Write a program num2rome.cpp that converts a positive integer into the Roman number system. The Roman number system has digits I
    8·1 answer
  • Below you will find the requirements to identify the Account Diversity Grade of a user. Read the requirements carefully and iden
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!