1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
barxatty [35]
2 years ago
11

a) In an office, it is required to take hundreds of copies of the same type written document. Which traditional method of docume

nt preparation can be used for this?
Computers and Technology
1 answer:
olga2289 [7]2 years ago
3 0

Answer:

I don't know

Explanation:

You might be interested in
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
3 years ago
When parallel parking, you should select a space that is __________ as long as your car.
Shtirlitz [24]

that is Equally as long as your car


7 0
3 years ago
Witch is the correct description of the first act in a classical game story structure
3241004551 [841]
Hitler because,Hitler was a great and wealthy companion
4 0
4 years ago
During a traceroute, which action does a router perform to the value in the Time To Live (TTL) field?
Sladkaya [172]

Answer:

<em>During a traceroute, the router decreases the Time To Live values of the packet sent from the traceroute by one during routing, discards the packets whose Time To Live values have reached zero, returning the ICMP error message ICMP time exceeded.</em>

Explanation:

Traceroute performs a route tracing function in a network. It is a network diagnostic commands that shows the path followed, and measures the transit delays of packets across an Internet Protocol (IP) network, from the source to the destination, and also reports the IP address of all the routers it pinged along its path. During this process, the traceroute sends packets with Time To Live values that increases steadily from packet to packet; the process is started with Time To Live value of one. <em>At the routers, the Time To Live values of the packets is gradually decreased by one during routing, and the packets whose Time To Live values have reached zero are discarded, returning the ICMP error message ICMP Time Exceeded</em>

7 0
3 years ago
URLs are the global ______ of resources on the Internet.
adell [148]
I believe the answer might be addresses 
 <span />
4 0
3 years ago
Read 2 more answers
Other questions:
  • Suppose that, in addition to edge capacities, a flow network has vertex capacities. That is each vertex vv has a limit l(v)l(v)
    7·1 answer
  • What is the main idea of this article? Please someone help me. I will give brainliest answer
    7·1 answer
  • True or false A ClassB fire involves live electrical equipment
    5·1 answer
  • Write a program that receives a series of numbers from the user and allows the user to press the enter key to indicate that he o
    11·1 answer
  • What Is The Oldest Known Analog Computer In The World?
    14·1 answer
  • Name a device, app or website then give features of the app that make it addictive and humane. (3 details for each)
    5·1 answer
  • Installing unauthorized hardware such as a communication software and modem Select one: a. Is a common practice and does not aff
    8·1 answer
  • Teachers can organize the classroom environment to facilitate activities and to prevent problems. True Or False
    15·1 answer
  • The keyboard shortcut to enter the current date in a field is
    11·1 answer
  • Write a program that prints the following 45 pairs of numbers:
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!