1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad1618 [11]
3 years ago
10

Can an iphone user see when an android user is typing

Computers and Technology
2 answers:
Katyanochek1 [597]3 years ago
5 0

Answer:

Dumb question

Explanation:

Vinvika [58]3 years ago
4 0
No an iPhone user cannot see what an android user is typing
You might be interested in
PLEASE HELPP!! WILL MARK BRAINLIEST!!~~~~~
slava [35]

Answer:

It allows a user to add multiple steps to common tasks.

Explanation:

hope it helps

8 0
4 years ago
An is auditor reviewing a network log discovers that an employee ran elevated commands on his/her pc by invoking the task schedu
yarga [219]
<span>I would say a cyber attack.since it is any kind of offensive act on a computer system including pc's that steals, alters or destroys confidential information and which is considered hacking a computer. Using the task scheduler to launch restrictive applications seems to qualify as such an attack since it is violating the restrictive applicatios.</span>
5 0
3 years ago
What was bill gates first operating system he created?
vagabundo [1.1K]
Microsoft windows was his first

3 0
3 years ago
How are programs and algorithms related? A program is a part of an algorithm. They are not connected at all. An algorithm is a p
almond37 [142]

Answer:

A program is a set of instructions that a computer executes.

An algorithm is a set of instructions that must be done in order to get some result.

If an algorithm is written in a programming language, then the program is an implementation of the algorithm.

An algorithm must not, however, be a program. An algorithm can also be performed manually (e.g. calculate 6431 + 8316 on paper or in your head).

Explanation:

6 0
3 years ago
How can public-key encryption be used to distribute a secret key?
navik [9.2K]
If you encrypt the secret key with someone else's public key, then only that person can decrypt it with his private key. The encrypted content can be freely shared with anyone, however only the intended recipient can retrieve the secret key since he is the only one with the proper private key.
8 0
3 years ago
Other questions:
  • WHICH OF THE FOLLOWING LOOKS JUST LIKE A CD ROM BUT CAN STORE MUCH MORE INFORMATION
    8·2 answers
  • Write a program with a function that accepts a string as an argument and returns a copy of the string with the first character o
    11·1 answer
  • Tom is the aerobics coordinator at a fitness center. He needs a more efficient way for his instructors to share information. Cla
    13·2 answers
  • Identify at least five different Information Technology careers that you could pursue in your home state, and choose the three t
    10·2 answers
  • What is the definition of a digital signal?
    14·1 answer
  • Write a program that ask the user to enter air water or Steele and the distance that a sound wave will travel in the medium the
    9·1 answer
  • Which term describes the distance from one point on a wave to the same point on the next wave?
    13·2 answers
  • Whats the formatting of a letter to the editor?​
    12·1 answer
  • What Is the device used to produce hard copies from personal computer ​
    5·2 answers
  • Which tool uses images and other visual elements to provide artistic
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!