1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad [161]
2 years ago
6

What happens when you call someone whose phone is off?

Computers and Technology
2 answers:
Virty [35]2 years ago
8 0
It will go straight to their, voicemail. 
EastWind [94]2 years ago
6 0
When you call someone whose phone is off, you will get sent straight to voice mail then when the person turns their phone back on they will receive your missed calls. Hope this helps!
You might be interested in
Suppose we compute a depth-first search tree rooted at u and obtain a tree t that includes all nodes of g.
Temka [501]

G is a tree, per node has a special path from the root. So, both BFS and DFS have the exact tree, and the tree is the exact as G.

<h3>What are DFS and BFS?</h3>

An algorithm for navigating or examining tree or graph data structures is called depth-first search. The algorithm moves as far as it can along each branch before turning around, starting at the root node.

The breadth-first search strategy can be used to look for a node in a tree data structure that has a specific property. Before moving on to the nodes at the next depth level, it begins at the root of the tree and investigates every node there.

First, we reveal that G exists a tree when both BFS-tree and DFS-tree are exact.

If G and T are not exact, then there should exist a border e(u, v) in G, that does not belong to T.

In such a case:

- in the DFS tree, one of u or v, should be a prototype of the other.

- in the BFS tree, u and v can differ by only one level.

Since, both DFS-tree and BFS-tree are the very tree T,

it follows that one of u and v should be a prototype of the other and they can discuss by only one party.

This means that the border joining them must be in T.

So, there can not be any limits in G which are not in T.

In the two-part of evidence:

Since G is a tree, per node has a special path from the root. So, both BFS and DFS have the exact tree, and the tree is the exact as G.

The complete question is:

We have a connected graph G = (V, E), and a specific vertex u ∈ V.

Suppose we compute a depth-first search tree rooted at u, and obtain a tree T that includes all nodes of G.

Suppose we then compute a breadth-first search tree rooted at u, and obtain the same tree T.

Prove that G = T. (In other words, if T is both a depth-first search tree and a breadth-first search tree rooted at u, then G cannot contain any edges that do not belong to T.)

To learn more about  DFS and BFS, refer to:

brainly.com/question/13014003

#SPJ4

5 0
1 year ago
The autocorrect feature can automatically capitalize the first letter in the names of days. true false
Westkost [7]
The answer is that it is true
3 0
3 years ago
Widget Corp. wants to shift its list of inventory to a cloud so that its different branches can access it easily. The company ne
____ [38]

Answer:

The best cloud option for Widget Corp considering the cloud computing option should be cost-effective and should not expose mission-critical applications and data to the outside world.

Is a hybrid could.

Explanation:

The reasons behind this answer are that in the first place the cloud is not going to be fully managed by a third party, but also by the IT department of Widget Corp allowing it to control its security. Also, that the cloud can be adapted to public or mainstream sources, resources, and platforms. Making it very user friendly and lowering down specific knowledge to use it.

5 0
3 years ago
What is the very first tag you must enter into a new HTML Document?
podryga [215]

Answer:

<HTML> tag

Explanation:

The first tag in any HTML file is the <HTML> tag. This tells web browsers that the document is an HTML file

4 0
3 years ago
Read 2 more answers
In a three-tier client/server design, a middle layer processes the client requests and translates them into data access commands
kipiarov [429]

Answer: Software Application

Explanation: Application software is a group of programs that is designed for end users. While system software is made up of low-level programs that interact with computers at a basic level, application software is above system software and it includes applications like word processors and spreadsheets.

7 0
3 years ago
Other questions:
  • Which of the following accurately completes this sentence? The Internet is ____.
    6·2 answers
  • What is client server relationship is the basic form of what
    6·1 answer
  • Pascal's Triangle is a triangular array in which every number represents the
    15·1 answer
  • 2.5 code practice I need answers please
    14·1 answer
  • , 13 dB correspond to a power ratio of ....?
    14·1 answer
  • Choose the correct term to complete the sentence.
    10·1 answer
  • I came here for a answer so why did i get a pep talk
    7·2 answers
  • Which group on the Note Master tab contains the command to add footers to the notes pages?
    11·1 answer
  • When creating a user generated function, what procedure is followed?
    9·1 answer
  • maximum cardinality indicates whether or not an instance of one entity class must be related to at least one instance of another
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!