1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kodGreya [7K]
4 years ago
8

Which term is used to describe a computer-based method of communication in which users can type and view informal messages sent

to one or more recipients, and view the responses immediately?
Computers and Technology
1 answer:
Vsevolod [243]4 years ago
3 0
The answer is instant messaging (IM).  This  is used to describe a computer-based method of communication in which users can type and view informal messages sent to one or more recipients, and view the responses immediately.  Instant Messaging (IM) <span>is a type of online chat that offers real-time text transmission over the Internet. </span>
You might be interested in
DHCP and FTP servers listen for and send network traffic on:
julsineya [31]

Answer: Well known ports

Explanation:

DHCP server transmit the response to the dynamic host configuration server protocol (DHCP) clients. DHCP default port is 67 and its port number is greater than the user data-gram specific port.

FTP server has its default listen at port 21 and file transition protocol(FTP) uses two transmission control protocol(TCP) connection for communication in the network. FTP passes information in port number 21, which is only used to send control information.

Well known port are use to identify the service of network on the public internet and private internet network. Therefore, port 21 and 67 are the well known ports.

 

5 0
3 years ago
What is the best programing language to use for building video games?
Alexxandr [17]

hey

I'm going to college for game design.

one of the best languages and the one I'm studying in is c# it is used in unity and many other game engines but there are many more. Just to list a few c++, Java, and many more it is up to you. if you would like more info about this just let me know By the way what game are you planning to make that is one of the most important factors

Hope this helps

-scav

6 0
3 years ago
What is considered necessary to establish OSHA
irakobra [83]
OSHA (the Occupational Safety and Health Administration) is a part of the US Department of Labor that establishes, issues, and enforces national workplace safety regulatio…ns. These are designed to make job areas and practices safer for US workers.
4 0
4 years ago
Super computer in nuclear energy ​
satela [25.4K]

Answer:

Dubbed “El Capitan,” the supercomputer is part of the Exascale Computing Project, a DOE effort to increase computing power so that the department can run highly advanced simulations and modelling of the United States' nuclear arsenal. These simulations help alleviate the need for underground testing.

4 0
3 years ago
An IT suspects that an unauthorized device is connected to a wireless network. This is a result of pastry sharing on a device br
telo118 [61]

Answer:

3. WiFi Protected Access 2

Explanation:

Given that Wi-Fi Protected Access 2 often referred to as WAP 2 is a form of computer security or privacy measure to ensure that Wireless networks are furnished with powerful security of data network access control.

Hence, when a user employed or utilize WPA2. It gives such a user a high degree of maximum certainty of controlling the users that can have access to his wireless network.

Hence, in this case, what is put in place to stop such activity is Wi-Fi Protected Access 2

6 0
3 years ago
Other questions:
  • Which is the last step in conducting a URL search?
    14·1 answer
  • What are some of the issues that organizations need to be aware of when designing and managing data?
    8·1 answer
  • Assume that the following method header is for a method in class A.
    15·1 answer
  • assume an int array, candy, stores the number of candy bars sold by a group of children wherecandy[j] is the number of candy bar
    7·2 answers
  • Place the steps in order to link and place text into the document outline, effectively creating a master document.
    8·1 answer
  • Which of the following are valid calls to Math.max? 1. Math.max(1,4) 2. Math.max(2.3, 5) 3. Math.max(1, 3, 5, 7) 4. Math.max(-1.
    9·1 answer
  • Explaio mode of Operation of x-ray​
    15·2 answers
  • A rectangle indicates a single process.true or false​
    7·2 answers
  • If a system contains 1,000 disk drives, each of which has a 750,000- hour MTBF, which of the following best describes how often
    15·1 answer
  • Which two features offered by SharePoint
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!