1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
attashe74 [19]
3 years ago
15

What happens if i receive a text while my phone is off?

Computers and Technology
1 answer:
SIZIF [17.4K]3 years ago
4 0
The text will post to your phone when it gets turned on
You might be interested in
after entering backstage view, and clicking account settings, what are the steps for creating a delegate for an outlook folder
stiv31 [10]

Answer: click delegate access, add a local user, choose permission roles, and then click ok

Explanation:

Right order for edge 2021

3 0
2 years ago
Who is the father of computer?​
horsena [70]

Answer:

Charles Babbage is the father of the computer

6 0
2 years ago
4
madam [21]

Answer:

its the basic link

Explanation:

6 0
2 years ago
Read 2 more answers
Is the cell phone changing our views about polite and impolite behavior? For example,
DochEvi [55]

*This question seems like an opinion based question, but here is my opinion on the matter:

Yes the cell phone is changing our views of what is polite and impolite. It is indeed impolite to talk on your phone while you are ordering a drink at Starbucks, because then you aren't focusing on ordering instead you are focused on your phone call which can interfere with your ordering.

Hope this helps!

8 0
3 years ago
Read 2 more answers
Selah infects the ads on a website that users from her target company frequently visit with malware as part of her penetration t
ValentinkaMS [17]

Selah infects the ads on a website with a technique called the Watering hole attacks.

<h3> What is Watering hole attacks?</h3>

The  Watering hole attacks is known to be a form of attack that depends on compromising or infecting a website that has or that targeted users who are known to often frequently visit.

So, Selah infects the ads on a website with a technique called the Watering hole attacks.

Learn more about malware from

brainly.com/question/399317

#SPJ1

8 0
1 year ago
Other questions:
  • The term integration mean?
    7·2 answers
  • Examples of email use that could be considered unethical include _____.
    14·2 answers
  • You are going to create an Arduino sketch where you have two push buttons, one piezo, one
    10·1 answer
  • Which of these is a negative effect of computer technology's role in creating
    9·1 answer
  • In what ways is the human brain like a computer? In what ways is it different?
    14·2 answers
  • Molly claims that she doesn’t have to proofread her code for typos because the interpreter will catch her mistakes for her. Is s
    10·1 answer
  • What is good work ethic?​
    11·1 answer
  • Which statement best describes the computers all around us?
    15·1 answer
  • In order to view a page break what should you do
    8·1 answer
  • You want to add a caption to a table. which tab contains this option?.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!