________ printers use a technology similar to that used in a photocopying machine.

A. Laser
B. Thermal
C. Cloud
D. Dot-matrix


Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. If an operation requires the executing thread to hold a lock while the operation is performed, a thread must relase the lock before proceeding with the operation. Other threads attempting to perform an operation that requires the same lock will be blocked until the first thread releases the lock, at which point the blocked threads may attempt to acquire the lock and proceed with the operation. b. To specify that a thread must hold a monitor lock to execute a block of code, the code should be placed in a synchronized statement. c. Code in a synchronized statement is said to be guarded by the monitor lock; a thread must acquire the lock to execute the guarded statements. d. The monitor allows only one thread at a time to execute statements within synchronized statements that lock on the same object, as only one thread at a time can hold the monitor lock. The synchronized statements are declared using the synchronized keyword.

Computer Science & Information Technology

In an editing system, all user interface events can be translated into implicit or explicit commands. Explain why, in Figure 28.10, the Event object therefore communicates directly with the editor data structure as well as the Command object.

What will be an ideal response?

Computer Science & Information Technology

In C, true evaluates to _____ and false evaluates to _______.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The term ____________________ refers to any program or set of program instructions designed to surreptitiously enter a computer, disrupt its normal operations, or gather sensitive data.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology