1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rasek [7]
3 years ago
13

If you delete a conversation many times with someone like this, will you stop receiving messages from them?

Computers and Technology
1 answer:
GREYUIT [131]3 years ago
4 0

Answer: No

Explanation:

You might be interested in
Given an int variable n that has already been declared and initialized to a positive value, write a Java program that prints the
Mars2501 [29]

Answer:

The program to this question can be given as:

Program:

public class Main //define class.

{

public static void main(String[] as) //define main method.

{

int n=5; //define variable n and assign positive value.

int i,j; //define variable

for (i = 7; i>=1; i--) //outer loop.

{

for (j = 0; j< i; j++) //inner loop.

{

System.out.print("*"); //print asterisks.

}

System.out.println(); //line break.

}

}

}

Output:

*****

****

***

**

*

Explanation:

The description of the above code can be given as:

  • In the above java programming code firstly we define a class that is "Main". In this class we define a main method in the main method we define a variables that is "n" in this variable we assign a positive value. The we define another integer variable that is i,j this variable is used in the loop.
  • Then we define a loop. for prints asterisks values in reverse triangle, we nested looping concept. In nested looping, we use in loop in this loop we use the i and j variables that print the asterisks value.

6 0
4 years ago
What data type stores images and audio visual clips???
nevsk [136]
Jpg is what I use for my audio and images
3 0
3 years ago
which statement describe “Hackers”? | A. all have the same motive | B. break into other people’s computers | C. may legally brea
AysviL [449]

Answer:

A

Explanation:

There's levels to it. As someone who use to play watchdogs anything is considered hacking.

5 0
3 years ago
What benefits did evolution realize by using the crm software?
Elza [17]
Hello there!
Answer:
Have included productivity improvements (doubling the number of deliveries for a speci²c time period), enhanced inventory management, automation of picklists, better resource planning, and more e±ective reporting to key stakeholders. Evolution’s CRM system can determine deliveries planned for any future month and the amount of product in stock, helping Evolution reduce stock holding by 40%. When a new patient is keyed onto system, tasks can be generated for Evolution’s team to organize delivery ahead of time. The system automatically generates a pick list for that patient from Evolution’s pharmacy. Managers can see tasks 2 weeks ahead and can allocate resources accordingly. Hoping this helps you! :D
4 0
3 years ago
Im not using Brainly for my account how do i Remove it
jeyben [28]
Log in to your account.
Visit your profile settings.
In the Privacy section, click the “Delete Account” button.
5 0
3 years ago
Read 2 more answers
Other questions:
  • Write a function called calculate() that accepts three integer Numbers as arguments, compute these values : Sum and Product and
    7·1 answer
  • A program called the ______ combines the object program with other programs in the library and is used in the program to create
    5·1 answer
  • Write the execution steps if the input is a lion.
    11·1 answer
  • How does the binary numbering system differ from the hexadecimal numbering system?
    14·2 answers
  • In presentation software, what is the way that text and pictures are arranged on a page called?
    10·1 answer
  • Why is Net WPM a better formula than Gross WPM to calculate typing speed?
    9·2 answers
  • How many ways do advertisers determine target audiences ??????
    15·1 answer
  • Numerical methods are implementations of mathematical algorithms, but constructed with special consideration for accuracy of sol
    7·1 answer
  • You started writing a paper yesterday. You worked on it again today. After a few hours, you realized that you have introduced so
    15·2 answers
  • What guidance identifies federal information security controls?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!