1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Angelina_Jolie [31]
3 years ago
5

A specialized output device for producing charts, maps, and very high-quality drawings is

Computers and Technology
1 answer:
Nimfa-mama [501]3 years ago
3 0

Answer:

B- plotter

Explanation:

because it's designed to produce high quality graphics.

You might be interested in
At what point in a vulnerability assessment would an attack tree be utilized?
ella [17]
During threat evaluation - A vulnerability assessment is done to gauge the impact expected from a successful attack and also how vulnerable the software is to an attack. An attack tree, when created during the threat evaluation phase allows one to analyze and describe possible attacks that can be realized on the system.
6 0
3 years ago
Write a SELECT statement that returns two columns: vendor_id and the largest unpaid invoice for each vendor. To do this, you can
Dafna1 [17]

Answer:

1. SELECT VendorID, MAX(InvoiceTotal) AS InvoiceMax

     FROM Invoices

     WHERE InvoiceTotal - CreditTotal - PaymentTotal > 0

     GROUP BY VendorID

2. SELECT SUM(InvoiceMax) AS SumOfMaximums

FROM (SELECT VendorID, MAX(InvoiceTotal) AS InvoiceMax

     FROM Invoices

     WHERE InvoiceTotal - CreditTotal - PaymentTotal > 0

     GROUP BY VendorID) AS MaxInvoice

5 0
4 years ago
A museum is evaluating historical documents for authenticity, reviewing their physical condition, and categorizing them by subje
ZanzabumX [31]

Answer:

Option C

Explanation:

The museum authority can easily automate the process of storage of data on cloud once the document is prepared.

This shall help is easy access to data to all and will also prevent issues arising because of non storage of data or some form of mis-happening leading to data loss.

3 0
3 years ago
(true/false) In a layered operating system design, requests (such user processes may need to interact with multiple layers, resu
Julli [10]

Answer:

The correct answer to this question is "true".

Explanation:

In a layered operating system, all the layers defined individually and communicate with each other when required. It is also easier to create, manage and update the system. If we change in one layer. The Changement has done in only a specific layer it does not affect any other layers. In this operating system, there are 6 layers.

In the monolithic system. It works on the kernel space. That increases the size of the operating system and kernel. It is different than the microkernel system. In the monolithic system, there are 3 layers.

If we assign any work to both, So the 6 layers will take more time to do that work. when that 3 layers take less time to do that work.

that's way layered operating performance is slower than the monolithic system.

6 0
4 years ago
A foreach statement can be used in place of the for statement whenever code looping through an array requires "access" to the co
Ede4ka [16]

Answer:

False

Explanation:

Foreach is useful when we want to do something for each element rather than repeating something for  n times

Answer is False

5 0
3 years ago
Other questions:
  • Your Economics teacher has asked you to create a chart showing how supply and demand affects the price of gasoline. Which applic
    11·1 answer
  • Consider the following code segment.
    15·1 answer
  • Shelly tells a friend that her computer needs to be fixed because it has been producing a lot of heat and is smoking. Where is t
    10·1 answer
  • In JAVA please:
    15·1 answer
  • Respuestas de un examen parcial en introducción to computer
    12·1 answer
  • Dimensional arrays can be created using loops. 2 dimensional arrays can be created using:
    10·1 answer
  • What is the purpose of networking with other businesses?
    10·1 answer
  • What happens when you run a program in Python? ​
    12·2 answers
  • Treating others with respect, even when they're impolite, is considered
    13·1 answer
  • ____ takes care of the transport between machines. but it is unreliable, and there is no guarantee that any given packet will ar
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!