one day when rahul went to his computer lab and saw that all the computers were connected to a single printer and whoever is giving a command to print, the print out comes from that printer. can you name the concept of communication? class 8 computer one word answer..​

Answers

Answer 1

Explanation:

you can connect multiple PCs to the wireless printer and print your documents from each one of them as long as the printer can be connected to the same network . You need the disc that came with the wireless printer to install the correct drivers on your computers and laptops.

hope it helps ( brainleist please )


Related Questions

Ishmael would like to capture a selected potion of his screen and then capture action he performs on that selected portion. What should he do?


Use a video from my PC command

User the insert screen recording control

Create a poster frame

Use an embed code

Answers

Answer: User the insert screen recording control

Explanation:

Since Ishmael wants to capture a selected potion of his screen l, after which he'll then capture the action that he performs on that selected portion, he should use the insert screen recording control.

It should be noted that on most keyboards, there's an "insert screen" button. Also, Ishmael can simply open the window that he wants to screenshot and then click the screenshot button.

Therefore, the correct option is B.

first calculating device​

Answers

Answer:

abacus is first calculating device

Fingers, people counted using fingers first.

She goes to look at her
HTML code to see what is wrong line by line until she can figure out what she
messed up. Which process is Ana using?

A. Fragmentation
B. Identification
C. Pinpoint
D. Debugging

Answers

Debugging is the answer

The process is Ana using is Debugging. Check below to see what the term is all about.

What is debugging used for?

Debugging is known to be the act of working on how a given program runs, and also how it creates data so as to be able to defects and know issues in a given code.

Note that since she goes to look at her HTML code to see what is wrong line by line until she can figure out what she messed up, she is engaged in debugging.

Learn more about Debugging from

https://brainly.com/question/163290

#SPJ2

subscribe to twomad or you are cringe for the rest of your life kid

Answers

Answer:

What if I don't want to?..........

Consider the classes below: Which of the following statements is true? Group of answer choices The value of counter will be different at the end of each for loop for each class. The value of j will be the same for each loop for all iterations. Both The value of counter will be different at the end of each for loop for each class and The value of j will be the same for each loop for all iterations are true. Neither The value of counter will be different at the end of each for loop for each class nor The value of j will be the same for each loop for all iterations is true.

Answers

Answer:

probly

Explanation:

Both The value of counter will be different at the end of each for loop for each class and The value of j will be the same for each loop for all iterations are true.

what is faster C++ or go lang

Answers

Answer:

C++

Explanation:

4. Which of the following is a face-to-face meeting between the hiring party and the applicant?
A. Interview
B. Application
C. Résumé
D. Reference

Answers

Answer:

A. interview

Explanation:

just need to know if these are correct

Answers

Answer:

Yes, they are correct.

Answer:yea g

Explanation:

Functions of file in computer ​

Answers

[tex]\huge{\textbf{\textsf{{\color{pink}{An}}{\red{sw}}{\orange{er}} {\color{yellow}{:}}}}}[/tex]

File in computers are used to store data, information and commands.

Thanks hope it helps.Pls mark as brainliest.

Your program has a loop where a user guesses a letter.

Your program compares the guess to each letter in the word.

Finish the code.

for n in range(lenWord):
if _______ == letter:
blanks = blanks[:n] + letter + blanks[n+1:]


correct[n]


correct


correct(n)

Answers

Answer:

its correct[n]

Explanation:

for n in range(lenWord):

if correct[n] == letter:

blanks = blanks[:n] + letter + blanks[n+1:]

A loop in a computer program is an teaching that repeats until a specified condition is reached.

In a loop structure, the loop asks a question. If the answer needs action, it is executed. The same question is asked  again until no other action is required.

What are loops used for in programming?

A Loop is employed to repeat a specific block of code a over and over. There are two main types of loops, for loops and while loops.

What are the 3 types of loops in programming?

In Java, there are three kinds of loops which are – the for loop, the while loop, and the do-while loop. All these three loop constructs of Java executes a set of replicated statements as long as a specified condition stays true.

To learn more about A loop, refer

https://brainly.com/question/26568485

#SPJ2

What does the revolver do?

sends the domain name and requests the IP address

sends the IP address and requests the content of the web page

sends the IP address and requests the domain name

sends the domain name and requests the content of the web page

Answers

Answer:

last one

Explanation:

so i just went to play forge of empires and when i logged on to it all of my progress was gone and i was so far in to it

Answers

Answer:

That's tough...

Explanation:

Answer:

ok and?

Explanation:

This is not a question

What is fish processing?

Answers

Fish processing involves preparing fish and seafood for delivery to consumers. Once fish is harvested, it must undergo several steps before it’s ready to be sold in the market. The process includes gutting, filleting and packaging of the product. Fish is a highly perishable food, so it must be carefully handled from the moment it’s caught until it’s sealed in packaging material

Fatima has 3 packs of batteries. Each pack contains 4 batteries. She gives her brother 8 batteries to put in his toy robot. Let b represent the number of batteries Fatima has left. Which equation could be used to find the value of b?

Answers

Answer: See explanation

Explanation:

Let b represent the number of batteries Fatima has left.

The equation that can be used to find the value of b goes thus:

(3 × 4) = b + 8

12 = b + 8

b = 12 - 8

Therefore, based on the above equation, the number of batteries that Fatima has left will be 4.

Choose the expression that belongs in the blank in order to have the output shown.

>>> a = 5
>>> print(_____)
The value is5

"The value is " + str(a)

"The value is" , str(a)

"The value is " , str(a)

"The value is" + str(a)

Answers

Answer:

Option B

Explanation:

Given

a = 5

and if the value allotted to variable a is to be printed, the following command will be used

print "The values is", str(a)

Hence, option B is correct

Examples of hardware that computes on a network can share are the operating system and the web browsers

Answers

Answer:

False.

Explanation:

The hardware component of a computer can be defined as the physical parts or peripherals that enables it to work properly. Some examples of hardware components are monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.

A software component of a computer comprises of software application or program that are used by the computer to manage or control software application, computer hardware and user processes. Some examples of software components are operating system, registry keys, antivirus, media player, word processor, etc.

In conclusion, the hardware components of a computer are the physical parts that can be seen and touched while the software components cannot be touched but rather are installed as a program.

Hence, examples of software but not hardware that computers on a network can share are the operating system and the web browsers

In VPython, which line of code creates a ball five units away from the user from the center?

ballPosition = _______

myBall = sphere(pos = ballPosition)


vector(0, 0, -5)


vector(0, -5, 0)


vector(-5, 0, 0)

Answers

The line of code creates a ball five units away from the user from the cente is  ballPosition = vector(0, 0, -5)

What is python code?

In Python, there is found to be a generally used coding language such as HTML, etc.

Know that it is often used in programming and software creation and as such, having the ballPosition =  to be vector(0, 0, -5) myBall = sphere(pos = ballPosition) is the right thing to do.

Learn more about VPython from

https://brainly.com/question/26497128

#SPJ2

How does a computer get the server's IP and how does it know which way to the server?

Answers

The browser connects to the domain name server (DNS) and retrieves the corresponding IP address for that specific server. It knows which way to go due to it being programmed to follow the exact instructions given by human interaction, its own hardware, and the software installed onto it.

When using the Photo Album dialog box, a picture

cannot be modified in this view.
cannot have text added.
can be inserted from a file or disk.
will be permanent when added to the box.

Answers

Answer:

can't have text added and will be permanent when added to the box

Kevin is scanning old images from his college library. He might use these scanned images in the college magazine. He might also use them on the college website. What is the best practice for Kevin to follow when scanning the images?
A.
scan the images with 72 DPI
B.
scan only the images that are ideal for a website
C.
scan the images with 150 DPI
D.
scan the images with 600 DPI
E.
scan the images that are ideal for a magazine

Answers

Answer: D. Scan the images with 600 DPI

Explanation:

Answer: D. Scan the images with 600 DPI

Explanation: Correct for Plato/Edmentum

what's wrong with this python code i don't know what's wrong with both of them

Answers

Answer:

Keep it in the format

first one:

def swapping_stars():

   line_str = ""

   for line in range(6, 8):

       for char in range(0, 6):

           if line % 2 == char % 2:

               line_str = line_str + "*"

           else:

               line_str = line_str + "-"

           print(str(line_str))

swapping_stars()

second one:

if you want it to go:

23456

def print_numbers(list):

   for i in range(1, len(list)):

       print(str(list[i]))

num_list = [1, 2, 3, 4, 5, 6]

print_numbers(num_list)

if you want it to go

123456

def print_numbers(list):

   doneONE = False

   for i in range(1, len(list)):

       if not doneONE:

           print(str(list[i] - 1))

           doneONE = True

       print(str(list[i]))

num_list = [1, 2, 3, 4, 5, 6]

print_numbers(num_list)

Explanation:

What is the output of this program?

grades = [89, 70, 98, 100, 83]

print(grades[-4])

Group of answer choices

89

100

70

98

Answers

Answer:

70 is the answer negative one begins from 83 and count down to 89, Therefore, 70 is is -4 and is chosen as the best answer


What requirements are necessary in order for you to share a file?
Check all that apply.
You own it.
You commented on it.
You can edit.
You know about the topic of the document.

Answers

Answer:

I. You own it.

II. You can edit.

Explanation:

A file can be defined as a computer resource that avails end users the ability to store or record data as a single unit on a computer storage device.

Generally, all files are identified by a name and type such as audio, image, video, document, system, text, etc. Each type of files can be transferred or send from one computer node to another computer node through the use of a wired or wireless connection and with the necessary level of permission.

The requirements which are necessary in order for you to share a file are;

I. You must own the file. This simply means that you have the authority to share the file and have it saved on your device.

II. You have the permission or required credentials to edit the file. A read-only permission cannot be used to edit a file but a full permission can be used.

BRAINLIEST 14 points
The Great Firewall of China _____. Select 4 options.

blocks websites
filters all emails
filters social media
filters web searches
jams signals

Answers

Answer:

the first four options

Explanation:

they make the most sense

The Great Firewall of China is designed and developed to:

Block websites.Filter all emails.Filter social media.Filter web searches.

What is the Great Firewall of China?

The Great Firewall of China can be defined as a set of legislation and network security protocol that domestically monitors, regulates and controls inbound and outbound Internet traffic in the People's Republic of China, based on set aside security rules.

In this context, the Great Firewall of China is designed and developed to domestically:

Block websites.Filter all emails.Filter social media.Filter web searches.

Read more on Great Firewall of China here: https://brainly.com/question/27411286

#SPJ2

Which connection type is a wireless method of sending information using radio waves?
O Cable
O Wi-Fi Fiber
Otic cable
O Broadband
please i need help but dont put up a wed site​

Answers

Hoped that helped lol, but yeah, the rest of them need wires

Edit: CAN I HAVE BRAINLIEST.

True or False

Operating systems control the loading of software applications onto a computer

All OSs offer user preferences allowing you to customize your computer

Answers

I used this from a other.

False

Software is the collection of large program or instruction of codes, which is used to perform some task. It is of two types of system software and application software.

The system software is used as a container for the application software and it is used to handle all other software it is used to operate the system.

Application software is used to perform any operation. This type of software can be used by the user if it is installed on the local machine on any system software

The operating system is also the part of the system software because it is used to operate the system and it is also the soul of the computer system which is also the function of the system software but the above question states that the operating system is not the part of the system software which is not correct. Hence false is the correct answer to the above question.

which feature of project management includes monetary compensation for the employees

Answers

Answer:

Extrinsic compensation

Explanation:

The feature of project management that includes monetary compensation for employees is the Extrinsic compensation.

Extrinsic compensation is reward ( tangible ) given to workers/employees by the management of a project for the speedy completion of a task or for the completion of a specific task . It can in the form of monetary compensation or non-monetary compensation.

example of Non-monetary compensation includes certificate of honor, medical insurance .

example of monetary compensation includes : work Bonuses , salaries

Which list shows a correct order of mathematical operations that would be used by a spreadsheet formula?

Answers

Answer:

It stands for Parentheses, Exponents, Multiplication/Division, Addition/Subtraction.

Which of these is a discipline?

software manager

customer service specialist

help desk technician

software engineering

Answers

Answer:

Option D

Explanation:

Discipline here refers to any educational course in which a person studies.

software manager , customer service specialist  and help desk technician are basically the job designations and not discipline in which one can pursue study.

However, software engineering is a discipline as one can educate himself/herself in this discipline and become a software engineer.

Hence, option D is correct

PLEASE HELPPPPP ASAP, 50 POINT'S + BRAINLIEST

1.) Online crimes causing loss of money: give 5 names and examples to each

2.) Online misconduct or crimes targeting medical offices and services: give 5 names and examples to each

3.) Online misconduct or crimes that you have experienced: give 5 names and examples to each

Answers

Answer:

1. Cybercrimes are online crimes that cause loss of money some examples are: Identity fraud, Cyber bribery, Debit/credit card fr/ud, and Email fr/ud.  

2. In medical offices devices linked to CT scans are able to be h/cked, there is r/nsomw/re that uses their devices. Since medic/l computers are always linked to the internet. it makes it easier for them to be h/cked. They make an employee click on an e-mail carrying m/lw/re, then the cybercrimin/ls encrypt p/tient data then dem/nd p/yment for its decryption.

3. This is a personal question but if you have ever been sc/mmed or witnessed someone being sc/mmed or almost got  sc/mmed it might apply to this question

Other Questions
The candle is lit and dilute ethanoic acid is poured down the inside of the beaker. As the acid reacts with the baking soda, bubbles of CO2 gas form. After a few secondsthe air in the beaker is replaced by 0.20 liter of CO2 gas, causing candle flame to go out. The density of CO2 gas is 1.8 grams per liter at room temperature.Choose the correct structural formula for the acid that was poured into the beaker. In the system of government described in the Articles of Confederation, what had the most power? A right rectangular prism with dimensions of 2 cm 5 cm and 10 cm is shown.5 cm2 cm10 cm* diagram not drawn to scaleWhat is the volume of the prism? The surface area of a figure is 62 cm^2. If the dimensions are multiplied by 4, what will be the surface area of the new figure? How much of a 100.0 gram sample of Gold-98 remains after 8.1 days ifits half-life= 2.7 days? 50.0 g12.5 g6.25 g25.0 g Hello, can you help me?1. What is the issue of this text?2. Does it give a pro or contra argument?3. How many arguments are given in the text?4. How persuasive do you find the argument?5. Is the text closed with strong recommendation? Please help ASAP!!! Need help badly Cul de las siguientes respuestas es equivalente a 3 decmetros? Hint: 3 decmetros es lomismo que 3 dam.(3 puntos300 cm30,000 cm300.000 cm3,000 cm please help me rn!! no links! Am I gamer? This is totally a real question. Bangladesh is a country of rivers and floods but groundwater is still a vital resource because it provides bacterially safe water and helps produce food for millions of people. In rural and urban areas almost the entire population rely on groundwater for potable water. In the early 1990s some 97% of the population used it for drinking, but this has now come down to about 80% due to the detection of arsenic in shallow groundwater. Use of groundwater in irrigation is increasing every year, and now more than 74% of the irrigated area is covered with groundwater. The country's industries also rely on groundwater for most of their water needs. Though Bangladesh has abundant rain and surface waters, these sources are not available when water demand is the most. Therefore, groundwater can be considered as the country's most important natural resource for ensuring public health and food security. Consider the options for groundwater contamination in Bangladesh and give recommendations for prevention and conservation of groundwater in Bangladesh. HELP PLS PLS IM BEGGING In the 15th century, China stopped trading with other areas of the world and became increasingly isolated. Which of these demonstrates that this action was the result of China's fear of cultural change? A disinfectant spray bottle says it eliminates 90% of bacteria with each application. You apply the disinfectant once to a countertop in the shipping department and then apply the disinfectant again to the same countertop. If the bottle is correct, what percentage of the bacteria originally on the tabletop have been eliminated?81%90.09%90.9%99%180% write a paragraph to explain how the transformation of water from one state of matter to another is important for the water cycle don bought the bookshelf for 42 dollars this was 3/4 of the regular price Farmers have been growing genetically engineered (GE) sugar beets since 2008. The beets, developed via biotechnology, are genetically boosted to withstand sprayings of a common herbicide that is otherwise fatal to both crop and weeds. Some organic farmers fear that these plants could be harmful. Pollen from the GE beets could contaminate organic sugar beets, irrevocably altering their genetic content. Environmentalists are concerned that herbicide-resistant weeds could develop. A 2010 request for an injunction against growing the GE beets, however, was rejected by a federal judge. The judge ruled that issuing an order so late in the beets' growing season would result in substantial economic damage.The beets are _________.Press enter to interact with the item, and press tab button or down arrow until reaching the Submit button once the item is selectedA bittersweetB corruptedC meagerD controversialDUE LIKE IN 12 MINUTES PLEASE SEND YOUR HELP Please please help me please I really need help Circle the error and then write thecorrect word in the space below.Mi padre sugirioalgunas ideas. True or False: When a preimage rotates 1/4around an origin, the rotation is a 180 degreeturn.