1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sp2606 [1]
3 years ago
7

What should you keep in mind when typing a message on the Internet?use as many A.acronyms as it saves space

Computers and Technology
1 answer:
Arada [10]3 years ago
4 0
I would say its B or D because you don't want to always use caps and you don't want to send a super long message.

Hope this Helps!!
You might be interested in
Which of the following is preventing the remote user from being able to access the workstation?
larisa86 [58]

Answer:

Option C is the correct option to the following question.

Explanation:

In the following statement, the absence of the network time simultaneous occurrence is generated by the authentication mismatches then, the remote user is preventing access to the workstations. So that's why the network time is absent that caused the prevention in the remote user by accessing the workstations.

5 0
4 years ago
Sydney Bark is twenty-three years old, and is looking forward to celebrating her birthday on April 12. For her birthday, she sav
DochEvi [55]

Answer:

a future date

Explanation:

Because most people when trying to guess a password, start with basic ones like: 1234,abcde, password,l and dates (like their birthday). whereas, the person would never guess it was a future date like when the person would be 30 or when they are going on a trip .

5 0
3 years ago
Create a structure representing a student. The member variables should include student name, student ID, and four test grades fo
Neporo4naja [7]

Answer:

Output:

Name: Brainly

ID:0001

Write the 4 tests grades of the student separated by space :10 9 8 10

Brainly

0001

10 9 8 10

Average :9.66667

'1' to continue '0' to exit :

Explanation:

#include<iostream>

#include<string>

using namespace std;

//variables declaration

struct Student {

  string id; //string declaration ID

  string name; // string declaration name

  int grades[4]; //array of 4 because it is 4 grades

};

//definition of the function get information

void inputData(Student &s){

 

   

   cout << "Name:" ;

   getline(cin,s.name);

   cout << "ID:";

   cin >> s.id;

   cout << "Write the 4 tests grades of the student separated by space :";

   for (int i = 0; i<4; i++)

       cin >> s.grades[i];

}

//definition of the function of average

double inputAvg(Student s){

   double summation;

   int temporary;

   double average;

   for (int i = 0; i<4; i++){  

      for (int j = i; j<4; j++){

         if (s.grades[j] > s.grades[i]){

             temporary = s.grades[i];

             s.grades[i] = s.grades[j];

             s.grades[j] = temporary;

         }

      }

    }

    summation = 0;

    for (int i = 0; i<3; i++){

        summation = summation + s.grades[i];  

    }

    average = summation/3;

    return average;

}

void disp(Student *s){

   cout << s->name << endl;

   cout << s->id << endl;

   for (int i = 0; i<4; i++)

       cout << s->grades[i] << " ";

   cout << endl;

   cout << "Average :" << inputAvg(*s) << endl;

   

}

int main(){

  Student st;

  int ch;

  while(true){

      inputData(st);

      disp(&st);

      cout << " '1' to continue '0' to exit :";

      cin >> ch;

      if (ch == 0)

         break;      

  }

  return 0;

}

6 0
3 years ago
P36. In Section 3.5.4, we saw that TCP waits until it has received three duplicate ACKs before performing a fast retransmit. Why
KatRina [158]

Answer:

The Packets can be arrived out of an order from the Internet Protocol layer.  

So, whenever the out of an order packets would be received then, it would be generated the duplicate ACK's, if we perform the re-transmission after the first duplicate ACK would be lead the senders to introduced too many redundant packets in the networks.

Explanation:

  • All the bytes, in the Transmission Control Protocol connections, are the numbered, from the beginning at the randomly choose the initial sequence number (ISN).  
  • The SYN packets consumes the one sequence number, so the data will be actual and it begins at the ISN+1.  
  • The receivers ack's sequences the number x acknowledged the receipts of all the data bytes that is less than byte the number x.
7 0
3 years ago
Create a public non-final class named Larger parameterized by a type T that implements Comparable. (Please use T or the test sui
Liula [17]

Answer:

see explaination

Explanation:

class Larger<T extends Comparable<T>> {

public boolean larger(T[] arr, T item) {

if (arr == null || item == null)

throw new IllegalArgumentException();

for (int i = 0; i < arr.length; i++) {

if (item.compareTo(arr[i]) < 0) {

return false;

}

}

return true;

}

}

3 0
3 years ago
Other questions:
  • A machine called a centrifuge is used in _____.
    8·1 answer
  • In some programming languages, such as C#, Visual Basic, and Java, every class you create is a child of one ultimate base class,
    8·1 answer
  • Write a program that asks the user for the names of two files. The first file should be opened for reading and the second file s
    13·1 answer
  • TRUE OR FALSE! A query can have no more than three common interpretations.
    10·1 answer
  • What are the pros and cons of using the internet in a medical office setting?
    7·1 answer
  • A piano manufacturer employs piano technicians who inspect instruments before they are shipped to customers: a.When inspecting a
    15·1 answer
  • List three ways security could be improved for taking the prepared deposit monies to the bank?​
    11·1 answer
  • Supplies/material used in iron​
    11·1 answer
  • FIFTY POINTS IF YOU CAN HELP ME!!!!
    11·1 answer
  • Re:
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!