1.printer is an example of......... device.

Answers

Answer 1

Printer is an example of output devise.It gives hard copy output on paper .

Answer 2

1. Printer is an example of output device.

I hope it's help you...


Related Questions

The wiring and connectors that carry the power to a motor must be in good condition. When a connection becomes loose, oxidation of the copper wire occurs. The oxidation ____. A. acts as an electrical resistance and causes the connection to heat more B. has no effect on the electrical connection C. decreases the resistance D. none of the above

Answers

Answer: A. acts as an electrical resistance and causes the connection to heat more.

Explanation:

The wiring and connectors that carry the power to a motor must be in good condition. It should be noted that in a case whereby the connection becomes loose, then the oxidation of the copper wire occurs and thee oxidation will act as an electrical resistance and then results in the connection to heat more.

In such case, this has an effect on the electrical connection and increases the resistance. Therefore, the correct option is A.

Which statement describes how to insert the IF, COUNTIF, or SUM function into a cell?

Use the Insert tab and select the appropriate function from the Functions group.
Type an = sign in the cell, followed by the name of the function and the relevant arguments.
Right-click the cell to access the context menu to insert the function.
Use the View tab and choose the correct function from the displayed list.

Answers

Answer:

Type an = sign in the cell, followed by the name of the function and the relevant arguments.

Explanation:

Microsoft Excel is a software application or program designed and developed by Microsoft Inc., for analyzing and visualizing spreadsheet documents. There are different types of functions used in Microsoft Excel to perform specific tasks and these includes;

1. VLOOKUP function: it's an Excel function that avails end users the ability to lookup data in a table organized vertically. Thus, it's typically used for searching values in a column.

2. SUMIF function: it is an Excel function to sum cells that meet criteria such as text, dates and numbers. This function can be used with the following logical operators; <, >, and =.

3. COUNT function: it's an Excel function to find the total number of entries in a column. For example, to count the number of entries in B1:B15; COUNT(B2:B15).

4. IF function: runs a logical test and returns one value for a TRUE result, and another for a FALSE result. For example, to fail scores that are below 40; IF (A1 < 40, "Fail", "Pass").

5. HLOOKUP function: it's an Excel function that avails end users the ability to lookup data in a table organized horizontally. Thus, it's typically used for searching values in a column.

In Microsoft Excel, to insert the IF, COUNTIF, or SUM function into a cell, you should type an equal to (=) sign in the cell, followed by the name of the particular function and the relevant arguments.

For example, to use the SUMIF function, you should type; =SUMIF(A2:B5, "Peter", C1:C9).

is computers takes lots of time to do any mathematical calculations.​

Answers

Answer:

I think the answer is a computer take lost of time to do any mathematical calculations because problem in the book or questions.

Hope this helps you ^^

A router on the border of your network receives a packet with a source address that shows it originating from a client on the internal network. However, the packet was received on the router's external interface, which means it originated somewhere on the Internet.

Answers

Answer:

The answer would be Spoofing

Greg has a list of payments for goods brought every month for the years 2009,2010,2011, and 2012. He needs information from only the last three years. He can filter this by clicking on

Answers

Answer:

"2009" and clicking "does not equal 2009"

Explanation:

The operator, 'does not equal', is a filtering operator used to exclude a specified attribute. The 'does not equal' operator is also used to provide the definition of the condition of the filter given that there are different values of two attributes

Therefore, given that there are only four years, and Greg needs the information of the last three years, which are, 2010, 2011, and 2012, the information for the year 2009 is to be excluded

Therefore, the correct option is; "2009" and clicking "does not equal 2009"

4 effect by which we can see several keyframes at once is
a. Onion Skin b. Layer Effect o c. Timeline Effect
5. You can control the speed of animation by increasing or decreasing the value in
a. Timeline a b. Fps Box O ㅁ c. Tools Panel
Write T for True and 'F' for False statements.
1. Pencil2D has autosave option for saving your work after every few minutes
2. The source code of Pencil2D is not available for users.
3. You cannot erase unwanted part of object or drawing on the stage 4. Hand tool is used to quickly move different parts of the stage. 5. Bitmap layer is used for raster graphics, which is made up of pixels.
Fill in the blanks.
1. Pencil2D is used to create animation using and graphics
2. The big white rectangle in the middle of your screen is called the
3. The is used to mark current frame displayed on the stage.
4 You can a layer to clearly identify it in the timeline.
5. Frame is the little in the Timeline, in which we create an image
6. You can fill color in your enclosed drawing or shape with tool.​

Answers

Onion skin
Onion timeline stage

A program in the cyberspace and intercept messages containing specific text A. Virus B. Sniffers C. Worm D. Bomb

Answers

Answer:

B. Sniffer

Explanation:

The type of program that is being discussed is called a Sniffer. This can either be a software or hardware that allows the user to intercept data flowing from a computer to the internet in real-time before it reaches its destination. The program can be very vague and intercept all the data coming and going to the target computer or it can be very specific and intercept only the data in which it was programmed to target (sniff out). Cyber Criminals use these programs/devices to steal valuable information that they know a user is going to send sooner or later over the internet.

Distinguish between afax and a telephone call (5points)​

Answers

Answer:
A fax is an exact copy of a document made by electronic scanning where as a telephone call is a communication or conversation via a telephone

The head of small organization wants to install a network so that all the employees of different department can share various resources: I. What type of network he/she needs to set up in the organization? II. Name the resource that the employees will be able to share after setting up the network. ​

Answers

Answer:

While the Internet was evolving and creating a way for organizations to connect to each other and the world, another revolution was taking place inside organizations. The proliferation of personal computers inside organizations led to the need to share resources such as printers, scanners, and data. Organizations solved this problem through the creation of local area networks (LANs), which allowed computers to connect to each other and to peripherals. These same networks also allowed personal computers to hook up to legacy mainframe computers.

An LAN is (by definition) a local network, usually operating in the same building or on the same campus. When an organization needed to provide a network over a wider area (with locations in different cities or states, for example), they would build a wide area network (WAN).

CLIENT-SERVER

The personal computer originally was used as a stand-alone computing device. A program was installed on the computer and then used to do word processing or number crunching. However, with the advent of networking and local area networks, computers could work together to solve problems. Higher-end computers were installed as servers, and users on the local network could run applications and share information among departments and organizations. This is called client-server computing.

INTRANET

Just as organizations set up web sites to provide global access to information about their business, they also set up internal web pages to provide information about the organization to the employees. This internal set of web pages is called an intranet. Web pages on the intranet are not accessible to those outside the company; in fact, those pages would come up as “not found” if an employee tried to access them from outside the company’s network.

EXTRANET

Sometimes an organization wants to be able to collaborate with its customers or suppliers while at the same time maintaining the security of being inside its own network. In cases like this a company may want to create an extranet, which is a part of the company’s network that can be made available securely to those outside of the company. Extranets can be used to allow customers to log in and check the status of their orders, or for suppliers to check their customers’ inventory levels.

Sometimes, an organization will need to allow someone who is not located physically within its internal network to gain access. This access can be provided by a virtual private network (VPN). VPNs will be discussed further in the chapter 6 (on information security).

Why should a user preview the document before printing?​

Answers

The user should preview a document first to make sure the layout is correct, so as not to waste paper if a font size or layout is incorrect.

Answer:

..........

Explanation:

.................sorry i dont know

Which category was originally developed to protect both digital and hard-copy sensitive information?

Answers

Answer:

Information assurance

Explanation:

Information assurance was originally developed to protect both digital and hard-copy sensitive information.

define data and user with example​

Answers

Answer:

Any data the user creates or owns. The term user data may be used to emphasize that the data were created and owned by the user. For example, when deleting an application, an uninstall program may ask if user data is also to be deleted.

Explanation:

Hope this helps you. Have a nice day^_^

A blog is a Web site of personal or commercial origin that uses a dated log format updated, daily or very frequently, with new information about a particular subject or range of subjects. true or false

Answers

True True True True True

you’ve found an image you want to insert into your slide presentation you want to make the image look more gray so that it looks like an older image what would you need to adjust

Answers

image grayscale

format : format options: recolor : then pick the color

Kolom terakhir pada lembar kerja Excel 2019 adalah​

Answers

Answer:

Tahan CTRL dan tekan tombol panah kanan (tombol kursor) pada keyboard. Anda dibawa ke kolom paling kanan. Dalam versi Excel modern, ini adalah kolom XFD, yaitu 16.384 kolom. Di versi Excel yang lebih lama (2003 dan sebelumnya) kolom terakhir adalah IV yaitu 256 kolom.

in english

Hold down CTRL and press the right arrow key (cursor key) on the keyboard. You are taken to the right-most column. In the modern versions of Excel this is column XFD, which is 16,384 columns. In older versions of Excel (2003 and prior) the last column was IV which is 256 columns.

how computer network reduce the cost of computer hardware? explain with example.​

Answers

Answer:

The biggest advantage of computer network is that the hardware components such as printers memory etc. can be shared by multiple computers. Hence it reduces the hardware cost of an organization

Answer:

One main method computer networking reduces the cost of computer hardware through the sharing of hardware component and resources including printers, faxes, memory space for data storage, processor, graphics capabilities, and internet access devices both locally, within a building and across sites

Computer network allows the sharing of a single resource mentioned above with several other computers, such that a single unit of each resource can be used by members of the same organization

Computer network also reduces the cost of additional space required where each computer is connected to its own components

Explanation:

What stage in the process of media production involves discussing the budget and timelines as well as identifying stakeholders? create/develop upload/display research/define plan/design

Answers

Answer:

research/define

It is C

what are the main charactericts of a computer​

Answers

Answer:

1.Diligence

2.speed

3.Accuracy

4.Versatility

5. Storage etc

In large organizations, there is a formal business function that includes developing an information policy, planning for data, overseeing logical database design and data dictionary development, and monitoring how information systems specialists and end user groups use data. __________ is responsible for information policy, as well as for data planning, data dictionary development, and monitoring data usage in the firm.

Answers

Answer:

Data administration.

Explanation:

Data management is a type of infrastructure service that avails businesses (companies) the ability to store and manage corporate data while providing capabilities for analyzing these data.

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Hence, a database management system (DBMS) is a system that enables an organization or business firm to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data.

Data administration is a strategic process that is typically responsible for establishing information policy, data planning, data dictionary development, and monitoring data usage in the firm.

ASAP

The Fleischer Studio produced two animated feature films. The financial success of both films was negatively impacted by what event?

- The Great Depression

- World War I

- World War II

- the popularity of television

The first to answer correctly gets a crown and 5 stars. Please help.

Answers

Answer:

The Great Depression and The popularity of television  and the event was The Great Animation Strike  

Explanation:

How do we explain the difference between fake news and facts​

Answers

Answer: it depends if the news is on the news and someone rights an article about it and says some mislead details that's how u know its fake  

Explanation:

The term platform as a service has generally meant a package of security services offered by a service provider that offloads much of the security responsibility from an enterprise to the security service provider. Select one: True False

Answers

Answer:false

Explanation:

8. Compare the advantages and disadvantages of using a smartphone rather than a laptop computer for creating a report.​

Answers

Answer: the advantage of using a smartphone rather than a laptop computer is that you can talk to people across the world, call people, make texts, and get easy access to the internet. but the disadvantages are that a lot of people stay inside their house because of phones, not getting enough exercise.

Explanation:

The advantages and disadvantages of using a smartphone rather than a laptop computer for creating a report. have been compared below.

The advantages of using a smartphone rather than a laptop computer are;

Portability; Smartphones are portable enough that they can fit into pockets and some purses and as such can be taken with you anywhere easily unlike a laptop computer that doesn't have such physical property.Cost; Smartphones are largely cheaper than the average laptop computer. Thus, cost is a good factor.

Disadvantages of using a smartphone rather than a laptop computer are;

Screen size; Smartphone screen size are always smaller than that of laptop computers .Software's; Smartphones can't run many of the type of powerful software's that can run on laptop computers.Data entry and user input; Due to the portability of smartphones, their keyboards are usually smaller than that of laptop desktops which makes data entry more difficult for those that have big fingers.

Read more about smartphones and laptops at; https://brainly.com/question/21283135

14. Applying formatting using the commands in the ribbon is called style
(page layout, override, justification)

Answers

Answer:

Override

Explanation:

Hope this helps

You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network has multiple wireless access points, and you want to use WPA2 on the network. What should you do to configure the wireless network

Answers

You are replacing a wired business network with an 802.11g wireless network. You currently use Active Directory on the company network as your directory service. The new wireless network will have multiple wireless access points. You want to use WPA2 on the network. What should you do to configure the wireless network?

(Select two).

a. Use shared secret authentication

b. CONFIGURE DEVICES TO RUN IN THE INFRASTRUCTURE MODE

c. Configure devices to run in ad hoc mode

d. Use open authentication with MAC address filtering

e.  INSTALL A RADIUS SERVER AND USE 802.1X authentication.

 

You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want the system to take immediate action to stop or prevent the attack, if possible. Which tool should you use

Answers

Answer:

Intrusion Prevention System (IPS)

Explanation:

Firewall can be defined as a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Simply stated, a firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

A firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access.

Basically, it is a network security device or security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer

Thus, the tool you should use is an intrusion prevention system (IPS).

An attacker uses an exploit to push a modified hosts file to client systems. This hosts file redirects traffic from legitimate tax preparation sites to malicious sites to gather personal and financial information. What kind of exploit has been used in this scenario

Answers

DDoS hope this helps :3

state whether the following statement are true or false​

Answers

The following statement is true , Please mark me brainliest

Which kind of image is indispensable and needs added text to go with it?

Answers

Answer:

A chart and a graph

Explanation:

Travis just got promoted to network administrator after the previous administrator left rather abruptly. There are three new hires that need onboarding with user accounts. When Travis looks at all the existing account names, he notices there is no common naming system. Where should he look to try to give the new hires user accounts with proper naming conventions

Answers

Answer:

The company's account policy

Explanation:

If there's no common naming system, It's best to go with the company's account policy.

Other Questions
When the person is being fed through an intravenous central catheter, they are given _____________________ nutrition. when was federalism implemented in nepal x+3/2 + (x-1) = 4/5 express ratio as a fraction in it's lowest terms.48s to 5minutes Johnny tripled his baseball card collection. Then he added 6 more cards to the collection. Now he has 24 cards. How many cards did he start with? Match each percent with the fraction or decimal equivalent. 5% 0.25 15% 0.07 6.5% 1 20 25% 0.065 7% 3/20 Find the distance between the two points in simplest radical form (6, 1) and (8,4) Chavez Corporation reported the following data for the month of July: Inventories: Beginning Ending Raw materials $ 36,000 $ 34,500 Work in process $ 20,500 $ 26,000 Finished goods $ 36,500 $ 51,500 Additional information: Raw materials purchases $ 70,500 Direct labor cost $ 95,500 Manufacturing overhead cost incurred $ 63,500 Indirect materials included in manufacturing overhead cost incurred $ 9,800 Manufacturing overhead cost applied to Work in Process $ 62,500 Any underapplied or overapplied manufacturing overhead is closed out to cost of goods sold. The cost of goods manufactured for July is: An unplanned increase in inventories _______. A. occurs when real GDP exceeds aggregate planned expenditure, so firms decrease production and real GDP decreases B. occurs when real GDP exceeds aggregate planned expenditure, so firms increase production and real GDP increases C. occurs when aggregate planned expenditure exceeds real GDP, so firms increase production and real GDP increases D. occurs when aggregate planned expenditure exceeds real GDP, so firms decrease production and real GDP decreases E. increases investment, which increases equilibrium expenditure and real GDP Suppose that 1 mL of an enzyme solution can completely catalyze 10 mL of substrate in 8 minutes. Now suppose that you change the amount of enzyme, the amount of substrate, or add another substance to the mixture. How would each type of change affect the reaction rate? Match the results you would expect with each change to the experimental design. The same result may occur with more than one experimental change. 1. Use 0.5 mL of enzyme instead of 1 mL 2. Use 5 mL of substrate mixed with 5 mL water instead of 10 mL of substrate 3. Add a molecule to the mixture that preferentially binds and blocks the enzyme's active site 4. Use 20 mL of substrate instead of 10 mLa. The reaction rate will be close to zero over the entire 8 minutesb. The reaction rate will remain steady over the entire 8 minutesc. The reaction rate will approach zero before 8 minutes. Solve the system of linear equations below.6x + 3y = 334x + y = 15A.x = 2, y = 7B.x = -13, y = 7C.x = - 2/3, y = 12 2/3D.x = 5, y = 1 Can someone help me solving this problem? I'm confuse so I want help..question :a) The length and breadth of a rectangular room are 10m and 8m respectively. How many pieces of carpet 5m long and 2m wide are required to cover it's floor? Please help me solving this problem ! If one angle equals 34, then the measure of its complement angle is 56.true or false Cyclical unemployment arises when:______. a. the agriculture sector completes the cycle of planting, cultivating, and harvesting the nation's food supply. b. labor unions strike for higher wages. c. the business cycle enters an expansionary phase. d. business activity in the macroeconomy declines. scientists are seen very busy in designing the solar power equipments, why? Kendra needs to rate five of her subordinates. She make a chart of all possible pairs of employees for each trait being evaluated. Then, she indicates the better employee of each pair with a positive symbol on the chart. Finally, she totals the number of positive symbols for each employee. Which method of performance appraisal has Kendra most likely used? Edna earns $680 per week and receives a raise of $95. What is her percentage increase in pay? [We consider the underlying fallacy of the plaintiff'sargument to consist in the assumption that the enforcedseparation of the two races stamps the colored race with abadge of inferiority. If this be so, it is not by reason ofanything found in the act, but solely because the coloredrace chooses to put that construction upon it. ... Theargument also assumes that social prejudices may beovercome by legislation, and that equal rights cannot besecured to the negro except by an enforced comminglingof the two races. We cannot accept this proposition.-U.S. Supreme Court, Plessy v. Ferguson, 1896Which statement explains why the Warren Court eventually overturned theruling above?A. The Warren Court believed that segregation did in fact stampAfrican Americans with a badge of inferiorityO B. The Warren Court felt that racial prejudice went against the valuesunderlying the entire constitutional system,C. The Warren Court believed that the separation of races tended toproduce the kinds of conflicts that the Founders wanted to avoidO D. The Warren Court felt that an enforced commingling of the raceswas necessary to overcome racial discrimination. Isaiah, a vibrant young boy, is the leader of a school debate team that is competing with a team from another school. He believes that his team is moral and strong, while the other team members are weak and evil. In the context of misperception, Isaiah most likely exemplifies ________ in this scenario.a. pluralistic ignorance.b. groupthink.c. conciliation.d. mirror-image perception.e. self-serving bias. consider this equation sin(theta) = -4 square root of 29/29 if theta is an angle in quadrant IV what is the value of cos (theta)