1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oduvanchick [21]
3 years ago
7

The ________ feature introduced by instant messaging shows whether a person is logged in and available to answer a question, pic

k up the phone, or stop by for a brief meeting.
Computers and Technology
1 answer:
tester [92]3 years ago
5 0

Answer:

The correct approach is "Presence awareness".

Explanation:

  • The willingness, at designated occasions, to see which one is available on the internet. When using the IM framework, that very many IM systems show a list of user groups attached to the system. A current model of the IGI Social website is being used by oneself.
  • With either the growing prevalence of Internet chat apps, a Presence Awareness model has been proposed by German IT professionals.
You might be interested in
In C language
devlian [24]

Answer:

The program in C is as follows:

#include <stdio.h>

#include <stdlib.h>

#include <time.h>

int main(){

   int dice [1000];

   int count [6]={0};

   srand(time(0));

   for (int i = 0; i < 1000; i++) {

       dice[i] = (rand() %(6)) + 1;

       count[dice[i]-1]++;

   }

   for (int i = 0; i < 6; i++) {

       printf("%d %s %d %s",(i+1)," occurs ",count[i]," times");

       printf("\n");

   }

   return 0;

}

Explanation:

This declares an array that hold each outcome

   int dice [1000];

This declares an array that holds the count of each outcome

   int count [6]={0};

This lets the program generate different random numbers

   srand(time(0));

This loop is repeated 1000 times

   for (int i = 0; i < 1000; i++) {

This generates an outcome between 1 and 6 (inclusive)

       dice[i] = (rand() %(6)) + 1;

This counts the occurrence of each outcome

       count[dice[i]-1]++;    }

The following prints the occurrence of each outcome

   for (int i = 0; i < 6; i++) {

       printf("%d %s %d %s",(i+1)," occurs ",count[i]," times");

       printf("\n");    }

8 0
4 years ago
Demonstrate your grasp of the Unix file system by constructing a directory structure as follows: In your home ( ~ ) directory, c
s2008m [1.1K]

Answer:

The steps to follow in executing the command are listed in the Explanation section

Explanation:

Open the terminal using Ctrl + Alt + T

To go to home directory, type: cd ~ OR just cd

To create a directory named UnixCourse, type: mkdir UnixCourse

To change directory to UnixCourse, type: cd UnixCourse

To create a fileAsst directory, type: mkdir fileAsst

To change directory into fileAsst, type: cd fileAsst

To create TweedleDee directory, type: mkdir TweedleDee

To create TweedleDum direectory, type: mkdir TweedleDum

To view the directory, type: ls

To copy from one directory to another:

cp ~/cs252/Assignments/fileAsst/hatter.txt  ~/UnixCourse/fileAsst/TweedleDee

To change to TweedleDee directory and list to view:

cd TweedleDee

ls

cd .. (this is to go back to the fileAsst directory)

To copy from one directory to another:

cp ~/cs252/Assignments/fileAsst/dormouse.txt  ~/UnixCourse/fileAsst/TweedleDum

To change to TweedleDum directory and list to view:

cd TweedleDum

ls

cd .. (this is to go back to the fileAsst directory)

The command below is executed as required:

~/cs252/bin/fileAsst-1

We check the directory for new file:

ls (to display entire file/folder)

then move the new file to TweedleDee directory

mv ~/UnixCourse/fileAsst/'name of file' ~/UnixCourse/fileAsst/TweedleDee

we then rename the file to rabbit.dat

mv ~/UnixCourse/fileAsst/TweedleDee/'name of file' ~/UnixCourse/fileAsst/TweedleDee/rabbit.dat

cd .. (this is to go back to the fileAsst directory)

The command below is executed as required:

~/cs252/bin/fileAsst-2

7 0
4 years ago
Is it possible for two different passwords to ""unlock"" the same user account? Explain your answer.
tresset_1 [31]

Answer:

yes but only if you have a backup password

4 0
4 years ago
Proxy manipulation occurs when a false dhcp server that can provide ip address configuration leases for a unique subnet and defi
maksim [4K]
True. A hacker in proxy manipulation may host a false proxy server or better known as a rogue DHCP and is able to modify the proxy settings on a client to redirect traffic to another system. The hacker is able to reconfigure a client’s proxy configuration.




8 0
4 years ago
Suppose that sales is a two-dimensional array of 10 rows and 7 columns wherein each component is of the type int , and sum and j
Aleonysh [2.5K]

Answer:

sum = 0;for(j = 0; j < 7; j++)sum = sum + sales[5][j];

Explanation:

here we evaluate condition in parenthesis

sum = 0 here variable sum is initialised with 0 value

now for loop executes the condition in parenthesis which is (j = 0; j < 7; j++)

  • j =0 is 1st condition which will be executed one time , so j = 0 means index value for loop started is with 0 as you know arrays have index
  • j<7 2nd condition for executing the code block which defines loop will go on till the value of j is less than 7 ,as we know the columns in question is 7(this condition must be true)
  • j++ 3rd condition means after each iteration value of j will increase +1
  • here this condition is true (j = 0; j < 7; j++) till 7th column
  • sum = sum + sales[5][j]   (sales [row][column] it indicates every 5th row element of each column)

3 0
4 years ago
Other questions:
  • Is a factory-formatted hard disk split into a fixed number of files?
    14·1 answer
  • Tissues of the same kind make up _____________ .
    7·2 answers
  • Complete the following statements by choosing the correct answer from the drop-down menus.
    14·1 answer
  • What is the main disadvantage of parallel circuits?
    11·1 answer
  • Mike's boss told him he needs to be more efficient. Select each suggestion that will help him become more efficient at creating
    9·1 answer
  • Google Analytics can collect behavioral data from which systems?
    6·1 answer
  • Amazon Web Services and Microsoft Azure are some of the most widely used _______.
    7·1 answer
  • When you are pasting an item, what choice will the Paste Options button offer you?
    9·1 answer
  • 1. It manages the computer's memory and processes, as well as all of its software and hardware.
    8·1 answer
  • You have been on the phone with a user in a remote office for 30 minutes troubleshooting their minor desktop problem. No matter
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!