1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeX [460]
3 years ago
14

How to know if someone read your message android?

Computers and Technology
1 answer:
vredina [299]3 years ago
4 0
Is it on the actual messages or on an app???
You might be interested in
Which of the following attacks is MOST likely the cause when a user attempts to go to a website and notices the URL has changed?
lilavasa [31]

Answer: C) DNS poisoning

Explanation: DNS poisoning or DNS cache poisoning is the type of attacking tendency towards the URL of the computer. These attempt to attack the URL using the spam mails and the user usually end up clicking on the URL provided by the attacker which invokes attack in the computer.

This mechanism takes place in the emails as well as the selected websites which can be accessed by the users easily.These attacks once enter the system seems like the real thing and become prone to many risks .

6 0
3 years ago
Units for measuring computer memory
lyudmila [28]

A kilobyte (KB) is 1,024 bytes, not one thousand bytes as might be expected, because computers use binary (base two) math, instead of a decimal (base ten) system. Computer storage and memory is often measured in megabytes (MB) and gigabytes (GB). A medium-sized novel contains about 1 MB of information.

6 0
4 years ago
A type of sensor used to detect which way around a device is being held. ​
Marta_Voda [28]
There’s 3 main ones accelerometer, gyroscope, and magnetometer.
8 0
3 years ago
____ allow us to store a binary image in code. (1 point)
lidiya [134]
The answer is bitmaps.
7 0
3 years ago
How many GPRs (General purpose registers) are in ATMEGA?
gogolik [260]

Answer:

There are 32 general-purpose 8-bit registers, RO-R31 All arithmetic and logic operations operate on those registers; only load and store instructions access RAM. A limited number of instructions operate on 16-bit register pairs.

8 0
3 years ago
Other questions:
  • Which of the following correctly describes the function of an IP address?
    7·1 answer
  • Please help.............​
    7·1 answer
  • What is computer engineering in your own words?
    8·1 answer
  • 3.
    5·1 answer
  • Free 35 points!!!
    11·2 answers
  • What single awk command can be used to display all the login names and their associated numerical user IDs
    14·1 answer
  • You want to use the randrange() method. Which line will allow you to enter the following code in IDLE?
    12·2 answers
  • Use the drop-down menus to complete statements about the two formats for importing contacts.
    11·2 answers
  • You ping a host on the internet to check for connectivity. Your ping times out, and you get no response. What is most likely the
    8·1 answer
  • Why won't Brainly let me create an account? I have tried many times but it just loads.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!