1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mezya [45]
3 years ago
6

If you were an online community director, you might use both chat and e-mail in your community. What are some similarities and d

ifferences between e-mail and online chat?
Computers and Technology
1 answer:
stealth61 [152]3 years ago
5 0

Emails are formal

Online chats are private and friendly

Emails are used for business

Online chats are for friends

You might be interested in
Transaction processing systems (TPSs) provide valuable input to management information systems, decision support systems, and kn
nadezda [96]

A transaction is a simple task carried out as part of corporate operations. Transaction processing systems (TPS) handle business transactions for the corporation, supporting overall enterprise operations.

A TPS creates papers pertaining to a non-inquiry transaction and records the transaction itself, together with all of its results, in the database.

Today, TPS are required for business operations in practically every firm. TPSs feed information into organizational databases; they also serve as the framework for management-oriented information systems. Source data automation frequently involves direct data entering. Electronic data interchange is being utilized by transaction processing systems more and more. These systems offer computer-to-computer communication without the need for repeated data entry by substituting paper documents with formatted transaction data sent over telecommunications networks.

Learn more about information here-

brainly.com/question/15709585

#SPJ4

5 0
1 year ago
Your colleague received an E-mail from a bank that is requesting credit card and PIN number information. Which of the following
uysha [10]

Answer: A) Phishing

Explanation:

Phishing is type of attack in computer field that is processed to hack or steal the data of authorized user.The attacker acts as trusted party and then interacts with the authorized user through email or messages to gain  confidential information like pin code, credit card number, login details etc of that user.

  • According to the question, colleague is experiencing phishing as he has been requested for pin-code and credit-card number from a wrong source behaving as authorized bank.
  • Other options are incorrect because ransomware is attack that asks for ransom from authorized user for reviving their access. on system. Spoofing is falsifying as some other party to receive advantage.
  • Mail poisoning is inclusion of inappropriate details in email such as invalid email address etc.
  • Thus, the correct option is option(A).
0 0
4 years ago
How can I link two classes together with spigot to make it so I can open a method within the said class. Trying to open my class
Andreyy89

Answer:

add the following code to your bar class

Explanation:

public Bar(Commands n) { }

5 0
3 years ago
Prove the following assertion: For every game tree, the utility obtained by MAX using minimax decisions against a suboptimal MIN
TiliK225 [7]

Answer:

From the given diagram, consider a MIN node whose children are terminal nodes, if MIN plays  

suboptimal. MIN will never be lower than the utility obtained playing against an optimal MIN  

MIN will always select a move having minimax utility greater than or equal to the move that is  

predicted by the minimax that is the MIN-played optimal value.  

Then the MIN node's value is increased to MAX. This is done by induction.  

One can do better than the minimax strategy, if the suboptimal play is predicted by MIN.

If MIN always falls for certain for certain kind of trap and losses, then setting up a trap guarantees a win.

Explanation:

See attached picture also.

5 0
3 years ago
Observe the following statements and decide whether the variable result’s value is TRUE or FALSE.
devlian [24]

Answer:

    result 1 = false;

     result 2 = true;      

Explanation:

result 1 = (43 < -77 && 1! = 10)

            43 < -77 = false

             1 != 10 = true

for any false && true logical operator, it returns false

    result 1 = false;

 false = 90 < -77 || -1 < 43

              90 < -77 = false

                -1 < 43 = true

for any false || true logical operator, it returns true

  result 2 = true;      

5 0
3 years ago
Other questions:
  • What are the 6 external parts of a computer
    14·1 answer
  • It is essential that a security professional is able to resolve and respond to cyber law inquiries and incidents while avoiding
    14·1 answer
  • Who are the founders of Microsoft?
    5·1 answer
  • Is ubisoft still making assassins creeds on xbox 360
    8·2 answers
  • "The ____________________ function is a logical function that returns a TRUE value if any of the logical conditions are true and
    14·1 answer
  • Kevin manages the security for his company and is working to implement a kernel integrity subsystem for key servers. Of the foll
    9·1 answer
  • Which of the following is the result of a query?
    9·1 answer
  • How many binary digits does a single hexadecimal digit represent?
    13·1 answer
  • Please i relly need this! ​
    11·1 answer
  • Write a 2 paragraph on an African American who has become successful in IT. Need help asap can’t think of anything
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!