1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mixer [17]
4 years ago
14

How to make a conversation program in java

Computers and Technology
1 answer:
Talja [164]4 years ago
4 0

Answer:

Creating a Chat Server Using Java

Introduction: Creating a Chat Server Using Java. ...

Step 1: Setup a ServerSocket in the Server Class. ...

Step 2: Create a Socket in the Login Class. ...

Step 3: Create a Loop to Continuously Accept Clients. ...

Step 4: Create the Client Threads. ...

Step 5: Create the Server Thread. ...

Step 6: Make the Client Thread Send and Receive Data.

You might be interested in
How to hack my neighboor wireless?​
guapka [62]

Answer:

 

How to Hack your Neighbor’s WiFi Password Using Tools

BY NEVIL PATELLEAVE A COMMENT

Getting a WiFi connection is a major concern once you are addicted to the web and mostly in the online world. When we hear the term hack, it strikes in our mind that it is the job of a high-end technology guy or a hacker. But to “hack WiFi password”, you don’t need to be a skilled technologist because even a non-technical guy can do it with some tricks and methods.

Most people have asked me the procedure to crack WiFi passwords, so today I am here with the solution and tricks for internet hack free WiFi from the major providers like AT&T, Comcast, and Xfinity.

 

wifi-password-hack

P.S. The WiFi password hacker tools are meant for fun/general purpose only and do not contain any functionality to attempt criminal acts. Therefore, you should be very cautious while operating them.

Wifi Hacker tools

(1) WiFi Hacker

WiFi Hacker is a simple and informal tool that makes hacking WiFi easy and safe without having required any technical knowledge. This software can crack WiFi passwords with some clicks and hack unlimited WiFi networks. WiFi Hacker gives you access to multiple offices or school wifi networks, including Comcast, AT&T, etc. which are equipped with tighter security. You can hack any locked password within minutes and anonymously because WiFi Hacker conceals your identity and personal information.

Explanation:

muwhahaha

7 0
3 years ago
Which of the following is a basic principle of improvement?
lesya [120]

From the given the statement, "every system is perfectly designed to get the results it gets" is a basic principle of improvement.

Option B

<u>Explanation:</u>

The improvement activity begins with the quote ‘every system is perfectly designed to get the results it gets’, by W. Edwards Deming; The quote states both the unintended and intended effects are designed into our systems.

For example: Healthcare in the UK has been perfectly designed to lower the waiting times to 18 weeks for various procedures over last twelve years. Reflecting on Safer Patients Initiative (SPI), this can be true to improvement systems: every improvement system is perfectly designed to get the results its gets and SPI is a case in point.

The leading improvements that need to be designed into our improvement systems:

  • Improvement activity needs to be built on strong foundations
  • Greater engagement with people’s intrinsic motivation
  • Embrace a wider set of methods
  • Greater understanding of how systems and processes outside direct clinical care contribute to safety and quality.

So, it can be concluded that the line given by W. Edwards Deming tends to be the principle of improvement.

6 0
3 years ago
Describe the conventional method of data processing​
andreyandreev [35.5K]

Answer:

The data processing is broadly divided into 6 basic steps as Data collection, storage of data, Sorting of data, Processing of data, Data analysis, Data presentation, and conclusions. There are mainly three methods used to process that are Manual, Mechanical, and Electronic.

4 0
3 years ago
Read 2 more answers
Security is essential to keep in mind when doing business online. Select three tips for keeping customers' private
zlopas [31]
Make sure credit card processing uses a digital certificate to verify the processing site
5 0
3 years ago
A computer ____ is the amount of data (measured in bits or bytes) that a cpu can manipulate at one time
garik1379 [7]

A computer BIT is the amount of data that a CPU can manipulate at one time.

8 0
3 years ago
Other questions:
  • The layout gallery displays 10 slide layouts with a variety of placeholders to define text and content positioning and formattin
    13·1 answer
  • Write three statements to print the first three elements of array runTimes. Follow each statement with a newline. Ex: If runTime
    12·1 answer
  • Sonora wants to extend the cells to be added in her formula. what is the quickest way to add more sells?
    10·2 answers
  • The United States is the only country in the world in which organs and tissue transplants are performed. True or False?
    8·1 answer
  • Match each keyboard command with its result.
    6·1 answer
  • Which type of function distill the information contained within a file (small or large) into a single fixed-length number, typic
    14·1 answer
  • A company wants a recruiting app that models candidates and interviews; displays the total number of interviews each candidate r
    6·1 answer
  • 30points for help
    14·1 answer
  • Your network has been having problems lately when users are participating in video conferences - the video and audio stutters ve
    13·1 answer
  • What is Utility Software ? Name any two utility programs. <br>​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!