what is the use of printer​

Answers

Answer 1

Answer:

To print stuff

Explanation:

Answer 2

Answer:

well um

Explanation:

ummmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm hmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm

to print things (⌐■_■)


Related Questions

Say you have 3 computers. Compare the cost of replacing the modem with a router/modem. Include the brand as well as price. I can't answer questions about this as I don't know what to do

Answers

Answer:

Comparing the cost of replacing the modem with a router/modem and its need in day today changing life.

Explanation:

As you known modem devices develop at a very gradual pace, you can normally use a modem for months, until it breakdown, but you might need to substitute a router because you require a more reachable area. After all, you've joined more computers to your web and your old router isn't holding up, or because you need to take the support of the latest development.

How many digits are there in a decimal system

Answers

Answer:

10

Explanation:

Answer:

4

Explanation:

Tenth , hundredth , thousandths , tenthousanths

If Mark has a read-write permission to the share \\fileserver\securefiles and a read-only permission to the file coolstuff.docx on the NTFS file system shared by the file share, he is able to perform which action?

a. Rename the file.
b. Read the file.
c. Change the contents of the file.
d. Delete the file.

Answers

Answer:

I don't know  you should figure that out good luck

Explanation:

good luck

While the Internet is used to share many useful services and information, there are growing concerns about the way that the Internet can be used to spread damaging information ranging from national secrets to calls for violence. Censoring this information may provide some people with increased security, but potentially risks free speech and the safety of social and political activists.

a. True
b. False

Answers

Answer:

A true!

Explanation:

Consider the following code segment, which is intended to simulate a random process. The code is intended to set the value of the variable event to exactly one of the values 1, 2, or 3, depending on the probability of an event occurring. The value of event should be set to 1 if the probability is 70 percent or less. The value of event should be set to 2 if the probability is greater than 70 percent but no more than 80 percent. The value of event should be set to 3 if the probability is greater than 80 percent. The variable randomNumber is used to simulate the probability of the event occurring.
int event = 0;
if (randomNumber <= 0.70)
{
event = 1;
}
if (randomNumber <= 0.80)
{
event = 2;
}
else
{
event = 3;
}
The code does not work as intended. Assume that the variable randomNumber has been properly declared and initialized. Which of the following initializations for randomNumber will demonstrate that the code segment will not work as intended?
A) randomNumber = 0.70;
B) randomNumber = 0.80;
C) randomNumber = 0.85;
D) randomNumber = 0.90;
E) randomNumber = 1.00;

Answers

Answer:

A) randomNumber = 0.70;

Explanation:

The code works perfectly for all values of randomNumber given in the options except option (a)

This is so because:

The first condition

if (randomNumber <= 0.70)  {  event = 1;  }

It checks if randomNumber is less than or equal to 0.70. This is true, so event is set to 1.

However, the next condition after it will also be executed because it is a different conditional to be executed.

So, we have:

if (randomNumber <= 0.80)  {  event = 2;  }

This condition is also true, so event is set to 2.

From the question randomNumber is meant to be event 1. However, this is different from the result of executing the code.

Hence, (a) is true

What is the major difference between the intranet and extranet?
Question 36 options:

Intranets hold more importance

The major difference between the two, however, is that an intranet is typically used internally.

Extranets improve internal communications

None of the above

Answers

Explanation:

The major difference between the two, however, is that an intranet is typically used internally.

The major difference between the intranet and extranet is that The major difference between the two, however, is that an intranet is typically used internally.

What is an Intranet?

Traditionally, an intranet is the concept of as a non-public and confined inner Web-primarily based totally web website online and/or community this is best handy to customers inside an organization.

An intranet is a non-public community contained inside an agency this is used to soundly proportion business enterprise facts and computing assets amongst employees. An intranet also can be used for operating in corporations and teleconferences. Intranets inspire communique inside an organization.

Read more about the communications:

https://brainly.com/question/26152499

#SPJ2

20.

Meter is to Kilometer as Gigabyte is to

?

... PINGULAR

A. Byte

B. Terabyte

C. Kilobyte

O D. Pedabyte

E. Megabyte

Previous

Answers

Answer:

Megabyte

Explanation:

Megabytes come before Gigabytes like how Gigabytes come before Terrabytes

8.11 LAB: Contact list (C++)









A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes as input an integer N that represents the number of word pairs in the list to follow. Word pairs consist of a name and a phone number (both strings). That list is followed by a name, and your program should output the phone number associated with that name.


Ex: If the input is:


3 Joe 123-5432 Linda 983-4123 Frank 867-5309

Frank

the output is:


867-5309


Your program must define and call the following function. The return value of GetPhoneNumber is the phone number associated with the specific contact name.

string GetPhoneNumber(vector nameVec, vector phoneNumberVec, string contactName)


Hint: Use two vectors: One for the string names, and the other for the string phone numbers.

Answers

Answer:

The vectors and phone numbers are 123-5432-983-4123-867-5309

Explanation:

How many digits are in the binary number system? Explain why.

Answers

Answer:

Since there are only two digits in binary, there are only two possible outcomes of each partial multiplication: If the digit in B is 0, the partial product is also 0. If the digit in B is 1, the partial product is equal to A.

Explanation:

Answer:

two digits

Explanation:

Binary – The binary numbering system has a base of 2 (MOD-2) and uses only two digits a “0” and a “1” to represent a binary number value.

raman will perform in pune tomorrow(simple past)​

Answers

Answer:

Raman performed in Pune yesterday

Answer:

Raman had performed in Pune

What can you use to make sure that you have no errors in Word Online?

Answers

Answer:

You can use grammarly. It woks amazingly!

Explanation:

A header is printed in the _____ margin
(1)Top
(2)Bottom
(3)Side
(4)both a and b ​

Answers

Answer:

(1)Top

Explanation:

Bcoz it is header

A header can be printed on the top margin.

What is a header?

A part of a text in the line that is generally used to describe the title or the topic of the text contained below such line is known as a header. It is represented in the top margin, as a title can be written on the bottom side.

Hence, option A holds true regarding a header.

Learn more about a header here:

https://brainly.com/question/15163026

#SPJ2

1) Who invented C Language.?
A) Charles Babbage
B) Grahambel
C) Dennis Ritchie
D) Steve Jobs​

Answers

Answer:

Dennis Ritchie is the answer

Java Programming Using nested if statement For a student to be accepted in XYZ College, the student must meet the following requirements: GPA must be 3.75 or higher. Family income must be more than $60,000 Applicant must be a New Jersey resident. XYZ college asked you to write a program to implement the above requirements. Write the program using (nested if) Submit: Source code for the program (java file) Output word or pdf or jpg Design pseudocode pdf or word or jpg

Answers

Answer:

Follows are the solution to this question:

import java.util.*;//import package  

public class Main//defining a class

{

       public static void main(String[] ags)//main method  

       {

       float GPA;//defining floating point variable  

       int annual_income;//defining integer variable

       Scanner ga = new Scanner(System.in);//creating Scanner class object

       System.out.println("Enter GPA of student family : ");//print message

       GPA= ga.nextFloat();//input value from user-end

       System.out.println("Enter annual income of student family : ");//print message

       annual_income= ga.nextInt();//input value from user-end

      System.out.println("Is student resident of New Jersey(y/n) :");//print message

       char a=ga.next().charAt(0);//defining char variable to input char value

if(GPA>=3.75) //use if block to check GPA value

       {

        if(annual_income>60000) // use if to check annual income value

         {

            if((a == 'y'|| a== 'Y')) //use if to check char value

   System.out.println("Student accepted in college");//print message

            else//defining else block

             System.out.println("Student is not accepted in college because he/she not resident of New Jersey ");//print message

         }

        else//defining else block

          System.out.println("Student is not accepted in college because annual income is less than $60000 ");//print message

    }

   else//defining else block

    System.out.println("Student is not accepted in college because GPA is less than 3.75 ");//print message

       }

}

Output:

Please find the attached file.

Explanation:

Please find the attached file of the pseudocode.

In this code one integer, one float, and char variable "GPA, annual_income, and a" is declared, that uses the scanner class for accept value from the user-end, and in the next step, nested if the statement is used that checks the GPA value, annual_income, and a value and use the print method to print a value with the message.

1. ERICUS Company sells Ghacem cement at 30.0 Ghana Cedis per bag. The company however gives discount of 15% for customers that buy 100 or more bags, and 0% for customers that buy less than 100 bags. Write a pseudocode.

Answers

See Comment for complete question

Answer:

Input Bags

Discount = 0%

If Bags >= 100 Then

Discount = 15%

End If

Print Discount

Stop

Explanation:

This gets the number of bags bought

Input Bags

This initializes the discount to 0%

Discount = 0%

If the bags of cement bought is 100 or above

If Bags >= 100 Then

This discount becomes 15%

Discount = 15%

This ends the if statment

End If

This prints the discount percentage

Print Discount

This ends the pseudocode

Stop

Which tab of the ribbon should you go to for removing gridlines on a worksheet?​

Answers

Answer:

just click on the option gridline

You should go to the Page Layout tab of the ribbon to remove gridlines on a worksheet.

This tab hold all the features and options that can enable you to arrange your documents as you want them to appear.

It can help you to do the following:

set marginstake control of the page orientationDisplay line breaksAdd sectionsSet paragraphs and also indent.

Read more on: https://brainly.com/question/11874395?referrer=searchResults

HELPOO ILL GIVE BRAINLIEST

Answers

Answer:

e

Explanation:

giv brainilest :D

Suppose we want an error correcting code that will allow all single-bit errors to be corrected for memory words of length 15. 1. How many check bits are necessary?2. Assuming we are using the Hamming algorithm presented to design our error-correcting code, find the code word to represent the 12-bit information word: 100100011010

Answers

Answer:

15

Explanation:

01234567891011121314

What is IP address ?explain​

Answers

Answer:

An IP address is a unique address that identifies a device on the internet or a local network. IP stands for "Internet Protocol," which is the set of rules governing the format of data sent via the internet or local network.

Explanation:

IP addresses provide a way of doing so and form an essential part of how the internet works.

Answer: An Internet Protocol address is a number which is unique to. each device connected to the label. It is used for identification and location.  

Explanation:

7 steps in infographic design​

Answers

Answer:

Step 1: Choose your topic and research your audience. Before looking at your data, think about a topic and an audience with whom it can resonate.  

Step 2: Take a look at your data and consolidate it.  

Step 3: Craft the copy.  

Step 4: Design!  

Step 5: Review, review, review.

Step 6: Publish and promote.  

Conclusion.

Explanation:

Process infographics are a specific type of infographic, designed to visualize, summarize and simplify processes. They're perfect for visualizing marketing strategies, new employee onboarding, customer journey maps, product guides, recipes and more.

Write a program that uses while loops to perform the following steps:

a. prompt the user to input two integers: firstNum and secondNum
b. Output all odd numbers between firstNum and secondNum.
c. Output the sum of all even numbers between firstNum and secondNum.
d. Output the number and their squares between 1 and 10
e. Output the sum of the square of the odd numbers between firstNum and secondNum.
f. Output all uppercase letters.

Answers

Answer:

Explanation:

//Include the required header files.

#include<iostream>

using namespace std;

//Define the main function.

int main()

{

//Define the variables.

int i, sum = 0, sqSum = 0, firstNum = 1, secondNum = 0;

char ch;

//Check for valid input.

while (!(firstNum < secondNum))

{

cout << "Enter starting number: ";

cin >> firstNum;

cout<<"Enter ending number(must be > startingNumber): ";

cin >> secondNum;

}

//Store first number in i

i = firstNum;

//Dispaly the number.

cout << "The odd numbers between " << firstNum

<< " and " << secondNum << " are:\n";

//Iterate between first and second number.

while (i <= secondNum)

{

//Check for even numbers.

//Store the sum

if (i % 2 == 0)

sum = sum + i;

//Print the odd numbers

//Evaluate the square of sum of odd number.

else

{

cout << i << " ";

sqSum = sqSum + i * i;

}

//Increase the value of i.

i++;

}

//Dispaly the sum of even numbers.

cout << "\n\nThe sum of the even numbers is:"

<< sum << endl << endl;

//Dispaly the sum of square of odd number.

cout << "The sum of squares the odd numbers is:"

<< sqSum << endl;

//Set i to 1.

i = 1;

//Dispaly the message.

cout << "\nNumber Square\n";

//Iterate and print number between 1 andd 10

//along with the sum.

while (i <= 10)

{

cout << " " << i << "\t " << i * i << endl;

i++;

}

//USe for visual studio.

system("pause");

//Return the value 0.

return 0;

}

Explanation:

The program code will perform the function listed below using loop.

Prompt the user to input two integers: firstNum and secondNum (firstNum must be less than secondNum). Output all odd numbers between firstNum and secondNum. Output the sum of all even numbers between firstNum and secondNum. Output the numbers and their squares between 1 and 10. Separate the numbers using any amount of spaces. Output the sum of the square of the odd numbers between firstNum and secondNum. Output all uppercase letters.

Hope this helps!

What is a boot sector

Answers

Explanation:

A boot sector is the sector of a persistent data storage device which contains machine code to be loaded into random-access memory and then executed by a computer system's built-in firmware. Usually, the very first sector of the hard disk is the boot sector, regardless of sector size and partitioning flavor.

what are layers in Photoshop ​

Answers

Answer:

Photoshop layers are like stacked pieces of stacked acetate. You can see through some parts because they are transparent. You can use layers to add on to your picture easily like adding extra images, text, or colors.

Top-level domain identifies the type of organization. Which one does NOT belong?
Question 4 options:

.gov

.mil

.org

.cn

Answers

Answer:

.cn does Not belong the rest of them do belong

the answer is “.mil”.

Which family of controls included in the risk management Infrastructure is related to preventing the use of unauthorized codes?​

Answers

Answer:

Operational Security Control

Explanation:

The family of controls included in the risk management Infrastructure that is related to preventing the use of unauthorized codes is known as "Operational Security Control."

This is because Operational Security Control defines potency of controls which involves the access controls, including the use of unauthorized codes, authentication, and security measures made to networks, systems, and applications.

Answer:

system and information integrity

Explanation:

i got a 100 on the test

how can you best explain server side caching with web pages​

Answers

Answer:

Server side web caching typically involves utilizing a web proxy which retains web responses from the web servers it sits in front of, effectively reducing their load and latency.

Explanation:

45. Our goals are a reflection of our:
O values
O standards
O obstacles
O resources
beliefs
values and beliefs

Answers

Values hope it helps you

Under the Gramm-Leach-Bliley-Act (GLBA), banks must protect customer privacy. A given bank has just implemented its online banking solution that allows customers to access their accounts and perform transactions via their computers or personal digital assistant (PDA) devices. Online banking servers and their public Internet hosting would fall within which domains of security responsibility?

Answers

Answer:

System/Application Domain and LAN-to-WAN Domain.

Explanation:

The Gramm-Leach-Bliley-Act is also referred to as the Financial Services Modernization Act of 1999. It was enacted by the 106th Congress of the United States of America and it requires that financial institutions explain to their customers the information sharing policies and ensure that customer sensitive data (privacy) is safeguarded.

This, under the Gramm-Leach-Bliley-Act (GLBA), banks must protect customer privacy.

In this scenario, a given bank has just implemented its online banking solution that allows customers to access their accounts and perform transactions via their computers or personal digital assistant (PDA) devices.

Hence, online banking servers and their public Internet hosting would fall within the System/Application Domain and LAN-to-WAN Domain.

In an IT infrastructure, there are seven main domains and these are the: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application.

a technique for printing text images or pattern which originated in china as a method for printing on paper​

Answers

Answer:

Woodblock printing or block printing is a technique for printing text, images or patterns used widely throughout East Asia and originating in China in antiquity as a method of printing on textiles and later paper. As a method of printing on cloth, the earliest surviving examples from China date to before 220 AD.

Word processing package allow users to?

Answers

Explanation:

allows users to create, edit, and print documents. It enables you to write text, store it electronically, display it on a screen, modify it by entering commands and characters from the keyboard, and print it. 

Other Questions
X^2+ 14x = -33Quadratic equation Which of the following is an example of using a laboratory test to regulate treatment?O A CBC is performed to determine if a patient has anemiaO A gonorrhea test is performed on a payment woman as required by state lawO A diabetic patient tests his or her blood to determine how much insulin to administerO A patient undergoes a blood cholesterol screening test Question 1Which of the following types of electromagnetic radiation has the shortest wavelengths?A. InfraredB. UltravioletC. Visible lightD. Radio waves Kingston Manufacturing has 29,000 labor hours available for producing X and Y. Consider the following information: Product X Product Y Required labor time per unit (hours) 3 3 Maximum demand (units) 7,000 5,000 Contribution margin per unit $ 5 $ 6 Contribution margin per labor hour $ 4.00 $ 3.50 If Kingston follows proper managerial accounting practices, how many units of Product Y should it produce One way in which Jefferson Davis and Abraham Lincoln were alike was that both *A: lost electionsB: became leadersC: had military backgroundsD: had good education Use a punnett square to calculate the following:George is the youngest child in a family that includes 4 children. All of the children have the recessive phenotype-attached earlobes. However both parents have unattached earlobes, the dominant trait. Use the letters G. g and answer the following:What is the genotype of the mother?What is the genotype of the father?What percentage of the offspring would express the recessive trait? a=pt+qp= -1, t=4 and q=6work out the value of a cual es la mitad de 1/4 kg de miel brian makes an investment in his companys stock . what does the stock chart say about the stock price today? The down arrow indicates the stock price has decreased from yesterdays price of $______ at the ______ of the marley day. Complete the statements.Now, check another value for the variable.When w = 2, the first expression isWhen w = 2, the second expression isTherefore, the expressions are? Question 6 of 59A wave has a wavelength of 5 m and a speed of 65 m/s. What is the frequency of this wave in Hz? First, the triangle is dilated by a scale factor of 1/3 about the origin. Then the triangle is reflected over the x-axis. Finally, the triangle is translated left 3 units and up 2 units. -9 3.The positive GCF of -9y and -3 is 3.3x= -9y3X3The factored expression is? i have 4 ounces. how many pounds do i have ? Classify the following triangle. Check all that apply.O A. ObtuseB. AcuteO C. EquilateralOD. IsoscelesO E. RightOF. Scalene ILL MARK BRAINLIEST The partition of India was a direct result of which of the following: A) Some Indians wanted to remain within the British Empire. B) Muslims did not want to be dominated by a Hindu majority. C) The Congress Party feared it was losing political power. D) The Muslim League failed to protect the civil rights of its members Please help me on this question PLZ HELP I WILL GIVE BRAINLIEST I will mark most branliest HELP ME LLEASE Which of these factors makes nuclear energy unsustainable?A. Nuclear energy requires wind turbines.B. Nuclear power plants cost the most to buildc. Nuclear energy generates too much toxic waste.D. Nuclear power plants last the longest.