1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mixer [17]
3 years ago
14

How to make a conversation program in java

Computers and Technology
1 answer:
Talja [164]3 years ago
4 0

Answer:

Creating a Chat Server Using Java

Introduction: Creating a Chat Server Using Java. ...

Step 1: Setup a ServerSocket in the Server Class. ...

Step 2: Create a Socket in the Login Class. ...

Step 3: Create a Loop to Continuously Accept Clients. ...

Step 4: Create the Client Threads. ...

Step 5: Create the Server Thread. ...

Step 6: Make the Client Thread Send and Receive Data.

You might be interested in
The benefits associated with AAA are increased security, increased control over the network, and the capability of auditing your
MrRissso [65]

Answer:

The answer is letter A.

Explanation:

The statement is true. The benefits associated with AAA are increased security, increased control over the network, and the capability of auditing your network.

6 0
3 years ago
A DBMS commonly receives data update requests from application programs.A. TrueB. False
Contact [7]

Answer:

A. True

Explanation:

DBMS is an acronym for database management system and it can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Some examples of a database management system (DBMS) are RDBMS, Oracle, SQL server, PostgreSQL, dBASE, Clipper, MySQL, Microsoft Access, etc.

A DBMS commonly receives data update requests from application programs through the Open Database Connectivity ( ODBC ) driver in case of communication with other database management softwares.

Basically, when a database management system (DBMS) receives data update requests from application programs, it simply instructs the operating system installed on a server to provide the requested data or informations.

4 0
3 years ago
System software can be described as end-user software and is used to accomplish a variety of tasks.
irina [24]
Your answer is false :)

I hope this helps! :)
8 0
3 years ago
Vivian wants to increase the storage capacity of her computer. Which components should she upgrade?
Nikitich [7]

Answer:

Hard drive

Explanation:

The hard drive is where the operating system, programs and data reside on (unless the data is saved and backed up elsewhere). An older hard drive that uses platters for reading and writing data to it will be slower than a later model solid state device. Newer hard drives have very fast access speeds compared to older units.

4 0
3 years ago
A vector is based on...​
Vaselesa [24]

Answer:

Magnitude and direction

Explanation:

Vector quantity is a quantity which is described by magnitude and direction

8 0
3 years ago
Other questions:
  • Whichof the following is not a standard method called as part of the JSPlife cycle?jspInit()jspService()_jspService()jspDestroy(
    12·1 answer
  • Databases can have various objects some of which are tables, queries, forms or views, and reports objects. Each of these has fie
    14·1 answer
  • Compare and contrast the following network types: Personal Area Network (PAN) Local Area Network (LAN) Metropolitan Area Network
    14·1 answer
  • 0001 0000 1100 0011 (unsigned, that is, interpreted as b2u)i.8 bit truncated value:ii.does the value change when truncated to 8
    7·1 answer
  • You should structure the<br> first before you search for a relevant picture.
    11·1 answer
  • Three of the most important jobs of security management are to ensure _____ are organized according to sensitivity, ensure that
    10·1 answer
  • You do not have to move your fingers to click the top row reach keys.<br> 1. True <br> 2. False
    15·1 answer
  • Please answer this question​
    8·1 answer
  • Escribe 10 ejemplos de lo que consideras un byte
    5·1 answer
  • windows switches to secure desktop mode when the uac prompt appears. what is the objective of secure desktop mode?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!