1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lozanna [386]
3 years ago
9

Hey guys join me

Computers and Technology
1 answer:
snow_tiger [21]3 years ago
8 0

Answer:

no

Explanation:

You might be interested in
In a(n) ____________________ device, the movement of electrons performs essentially the same functions as gears and wheels in me
lana66690 [7]

Answer:

Electronic computing.

Explanation:

8 0
2 years ago
The term used to describe whereby old and new media are available via the integration of personal computers and high speed satel
garri49 [273]

The term used to describe whereby old and new media are available via the integration of personal computers and high speed satellite based phone or cable links is: media convergence.

<h3>What's a good illustration of media convergence? </h3>
  • Smartphones, laptops, and ipads are the finest instances of media convergence since they combine several forms of digital media, including radio, cameras, TVs, music, and more, into a single, straightforward gadget.
  • The blending of formerly separate media platforms and technologies through digitization and computer networking is referred to as media convergence. Another name for this is technical convergence.
  • Media ownership concentration, sometimes referred to as media consolidation or media convergence, is the process through which a smaller number of people or organisations come to control a larger portion of the mainstream media.
  • According to recent study, there is a rising amount of consolidation in the media sectors, which are already highly concentrated and controlled by a very limited number of companies.

To learn more about media convergence, refer to the following link:

brainly.com/question/25784756

#SPJ4

6 0
2 years ago
When your phone sends/receives text messages (specifically using SMS), the total data sent/received contains more than just your
Alexandra [31]

An SMS is a short code that is used by businesses to opt in consumers to their SMS programs, and then used to send text message coupons, offers, promotions to those customers that had previously opted.

Explanation:

When Someone tries to call you, the tower sends your phone a message over the control channel that tells your phone to play its ringtone. The tower gives your phone a pair of voice channel frequencies to use for the call.

The MMS and other data driven services works on the fundamental voice network and is based on the big three GSM, CDMA and TDMA network technologies. The SMS allows text messages of 160 characters (letters, numbers and symbols).

The text messaging is an act of composing and sending electronic messages consist of alphabetic and numeric character between two or more more mobile devices.

7 0
4 years ago
Read 2 more answers
What type of selection can be used in leu of switch/case?
tankabanditka [31]
An if or else statement can be
7 0
3 years ago
Read 2 more answers
True/False
Gnom [1K]

Answer:

True

Explanation:

Since most database applications are Server-Client  structured, the User interface sits on the clients and the database sits in the server... when I say database I'm referring to the DBMS (Database Management System). A server is needed to host the DBMS and in turn it stores data from the UI and feeds data back to the UI based on the instruction written by the developer.

8 0
3 years ago
Other questions:
  • Unit Test
    5·2 answers
  • A _____ attack keeps the target so busy responding to a stream of automated requests that legitimate users cannot get in
    9·1 answer
  • The ____ is the configuration of a system documented at the beginning of the project and consists of all necessary system requir
    8·1 answer
  • If you write a toString method to display the contents of an object, object1, for a class, Class1, then the following two statem
    7·1 answer
  • Suppose we have a byte-addressable computer with a cache that holds 8 blocks of 4 bytes each. Assuming that each memory address
    7·1 answer
  • What is the most secure method for controlling privileged access to a system available for use in a public area?a. Database view
    5·1 answer
  • Consider the code block below. What is the value of amount when this method is called twice, the first time using cookieJar(7) a
    9·1 answer
  • 10
    14·2 answers
  • Whats the overall mood of the song Rags2Riches by rod wave
    14·1 answer
  • Part of the operating system core is responsible for controlling security, managing the file system, and providing a platform fo
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!