1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sineoko [7]
3 years ago
9

In Android system, an e-mail application that shows a list of new emails, composes an email, or reads an email is called (A) Ser

vice (B) Thread (C) Activity (D) Communication (E) None of the above.
Computers and Technology
1 answer:
leonid [27]3 years ago
6 0

Answer: (C) Activity

Explanation: An emails, also known as electronic mail is the mode of exchanging of the messaging or the information between two people or more via internet ,so it is a kind of a service an all the factors that all present in the mail are known as activities. Activities in email include the actions like reading of the mail , opening of mail, sending mail, showing list of the new mails etc.

You might be interested in
Most computer attacks are designed to steal information or money. Which of the following attacks is designed to slow down or sto
Serggg [28]

Answer: (D)DoS attack.

Explanation:

Denial of Service attack occurs when an hacker prevents the real users from accessing the service by sending excessive message to the server asking it to authenticate requests with invalid return address.

7 0
3 years ago
Which of the following is the best name for a history report about world war 1
kolezko [41]

Answer: "World War-1: The War that Changed the Nation"

8 0
3 years ago
Describe how you would create a Java program that prompted the user to correctly enter a username and password. The username is
schepotkina [342]

Answer:

Explanation:

The program in question would create a new Scanner Object which asks the user for the Username first. It would then save this input into a temporary variable and compare it to the actual username in the database. Since the username is not case sensitive, we would use the toLowerCase() method on both the input and the database username so that they match even if the letters are not the same case structure. If both usernames match then we would move on to ask the user for the Password and compare it with the database password for that user. Since this one is case sensitive we would compare as is. Finally, if both Username and Password match we would print "Hello World" otherwise we would print "Login Failed."

3 0
2 years ago
You load an image file into a numpy array and look at its shape, which is (433, 650). What does this indicate?
Nat2105 [25]

Answer:

option C

Explanation:

The correct answer is option C

the uploaded image shape is ( 433 , 650 )

this shape means that the image is a grayscale image which is 433 pixels high by 650 pixels wide.

a gray scale image is  in white and black color.

433 pixels high by 650 pixel wide means that the image is formed with the combination of 433 vertical dots and 650 horizontal dots.

Resolution of an image can be found out by the  pixels present in the images.

higher the pixel higher is he resolution of the image.

6 0
3 years ago
Gregory Yob is associated with which of these games?
DiKsa [7]

Answer:

Gregory Yob is associated with Hunt the Wumpus.

Explanation:

Hunt the Wumpus was developed in 1973 by Gregory Yob and was one of the first games where the player can move around a series of interconnected controls.

please mark brainliest it really helps :)

3 0
3 years ago
Read 2 more answers
Other questions:
  • major m,ajorrr points helpppppppppppppppppppppppppppi have a question i hit a few buttons and now my computer is saying everythi
    11·2 answers
  • The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n _
    14·1 answer
  • Which is an example of a screenshot?
    7·2 answers
  • True / False<br> 1. A byte is a standardized unit of measure that is always 8-bits.
    7·1 answer
  • How is marketing related to the other functions of a business
    14·1 answer
  • relational integrity constraints are rules that enforce basic and fundamental information-based constraints. True or False
    9·1 answer
  • What of the following is not a benefit of active listening
    8·2 answers
  • What decides the amount of delay between shots on a digital camera?
    7·1 answer
  • Many web pages use a <br> structure to define an area of focus
    13·1 answer
  • If each integer occupies one 64-bit memory cell and is stored using sign/magnitude notation, what are the largest (in terms of a
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!