1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikentia [17]
2 years ago
5

What Is the device used to produce hard copies from personal computer ​

Computers and Technology
2 answers:
insens350 [35]2 years ago
5 0
Im pretty sure the name for this is an input device.
Y_Kistochka [10]2 years ago
3 0

Answer:

printer

Explanation:

printer is a device that produce what you have on your computer into paper form

You might be interested in
Who loves you tube , anyone?
kodGreya [7K]

I LIKE IT DO YOU ALSO LOVE IIT

8 0
3 years ago
Read 2 more answers
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio
KatRina [158]

Answer:

Advanced persistent threat.

Explanation:

Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.

It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.

7 0
3 years ago
Should Gladys call the legal authorities? Which agency should she call?
tiny-mole [99]

Answer:

The answer to this question can be defined as below:

Explanation:

Yes, Gladys is called the legal authority. In the whole situation, legal officials can be concerned, even though the situation can proceed to fraud. Then it will be acceptable to make a report to the Justice Department.

  • In a corporation, it should always tend to avoid the issue, like leaking information, leaking the glamorous info to the press.
  • They may have a contract within the organization to avoid all of this.
3 0
3 years ago
Which of the following cannot be created using Word software?
Arturiano [62]
3-database of new clients
7 0
3 years ago
Use the STL class vector to write a C function that returns true if there are two elements of the vector for which their product
Tema [17]

Answer:

Code is provided in the attachment form

Explanation:

Vector Multiplication code:

Vector_multiplication.c file contains C code.

See attachment no 1 attached below

Classification of Algorithm: For creating elements in vector c of size n, number of scalar  multiplications is equal to n. The size of original two vectors scales directly with the number of  operations. Hence, it is classified as O(n).

7 0
3 years ago
Other questions:
  • Which information technology job has the lowest predicted 10-year growth? computer programmer software developer computer suppor
    13·1 answer
  • I need help to find out what is wrong with this program and my variable, "exponent" comes out as 0 in the output instead of the
    14·1 answer
  • Troubleshooting a printer that does not work includes a. connecting the printer to your computer b. checking to see if there is
    13·1 answer
  • Which file type is typically used for videos? GIF MPEG MP3 PDF
    8·1 answer
  • Write a Python 3 script in PyCharm that will simulate the game of "Rock, Paper, Scissors": Display a header and the simple rules
    8·1 answer
  • Create an application named TurningDemo that creates instances of four classes: Page, Corner, Pancake, and Leaf. Create an inter
    7·1 answer
  • What best describes "broadband access"?
    13·1 answer
  • I CANT DO SKIN MODS ON BRAWLHALLA RIGHT!!!! IM SO MADDDDDDDDDDD
    11·1 answer
  • To indent an entire paragraph or list you should:
    9·1 answer
  • Name 4 components of a components system​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!