1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
salantis [7]
3 years ago
8

4 function of scanner ​

Computers and Technology
2 answers:
Anika [276]3 years ago
7 0

Answer:

Scanner is good

scanner is used to scan documents.

<h2><u>thank</u><u> </u><u>you</u></h2>

Natasha_Volkova [10]3 years ago
7 0
A scanner is a device that captures images from photographic prints, posters, magazine pages, and similar sources for computer editing and display.
Scan — It captures the images that can be saved as a file or sent to an image editing application.
Copy — It scans the images and sends it to the printer to get a hard copy at the same time.
E-Mail — It scans the images and delivers it directly to the e-mail editor.
You might be interested in
What is motherboard ?​
PtichkaEL [24]

Answer:

A motherboard is the main printed circuit board in general-purpose computers and other expandable systems. It holds and allows communication between many of the crucial electronic components of a system, such as the central processing unit and memory, and provides connectors for other peripherals

4 0
3 years ago
What is this on G00gel Documents , how do I fix it?
mylen [45]

Answer:

Sorry but it donest show the picture

Explanation:

7 0
2 years ago
List of the earliest invention in human history?​
mojhsa [17]

Answer:

Airplanes, Telephones, Ships, Pens

7 0
3 years ago
Write a program that outputs the number of characters, words, and lines in the files that are supplied as command-line arguments
Dahasolnce [82]
Public class Exercise_13 {

public static void main(String[] args) {

if (args.length != 1) {
System.out.println("Invalid arguments.");
System.out.println("Usage: java Chapter_12.Exercise_13 filename");
System.exit(1);
}
File filename = new File(args[0]);
if (!filename.exists()) {
System.out.println(filename + " does not exist.");
System.exit(2);
}

int characters = 0;
int words = 0;
int lines = 0;

try {
Scanner input = new Scanner(filename);
while (input.hasNext()) {
String s = input.nextLine();
lines++;
characters += s.length();
String[] split = s.split(" ");
for (String word : split) {
words++;
}
}

} catch (FileNotFoundException ex) {
ex.printStackTrace();
}

System.out.println("Characters: " + characters);
System.out.println("Words: " + words);
System.out.println("Lines: " + lines);


}
}
4 0
3 years ago
With simple segmentation, a process is divided into a number of segments that need not be of equal size. When a process is broug
hoa [83]

Answer:

The missing word is <em>backing store.</em>

Explanation:

A backing store is a device for secondary storage of data that typically has greater capacity than the primary store but is slower to access.

A process must be loaded into memory in order to execute.

If there is not enough memory available to keep all running processes in memory at the same time, then some processes who are not currently using the CPU may have their memory swapped out to a fast local disk called the backing store.

The backing store may be the Hard Disk Drive or a Universal Serial Bus Drive.  The backing store can sometimes be referred to as <em>virtual memory.</em>

This memory that appears to exist as main storage although most of it is supported by data held in secondary storage, transfer between the two being made automatically as required.

Cheers!

4 0
3 years ago
Other questions:
  • You are reluctant to write an extra credit book report because you are afraid that your language and punctuation skills are not
    11·1 answer
  • Rewrite this method so that it avoids the use of a return statement:
    15·1 answer
  • What function does the ALU perform?
    10·1 answer
  • _______ is a variation of phishing that uses voice communication technology to obtain the information the attacker is seeking.
    9·1 answer
  • A network administrator has been creating a baseline of network performance. During this process, he realizes that one router is
    14·1 answer
  • Which type of password would be considered secure
    13·2 answers
  • Write a C++ program to count even and odd numbers in array. The array size is 50. The array elements will be entered by the user
    13·1 answer
  • Whoever wants to join me in The Sims (mobile), my friend code is:<br> EPQL3E9<br> Come join me!
    5·2 answers
  • Which option best explains the goal of computer science?
    9·1 answer
  • Volume of a cuboid is 14400 ​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!