1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andre45 [30]
2 years ago
14

Why are my texts green when texting another iphone.

Computers and Technology
1 answer:
Ede4ka [16]2 years ago
4 0

Answer:

The green message background indicates the traditional SMS text message. It actually means a message that you have sent to someone else is through SMS message service instead of Apple iMessage

:

You might be interested in
g What advantage does a circuit-switched network have over a packet-switched network? What advantages does TDM have over FDM in
REY [17]

Answer:

Advantages of a circuit-switched network over a packet-switched network are:

  • In Circuit-switched networks, resources needed to provide communication between the end systems for the duration of the session are usually reserved unlike in packet-switched networks where they are not reserved.
  • Circuit-switched networks have faster communication, so they can be used for Voice/Video calls
  • Circuit-switched networks have less errors in communication
  • Circuit-switched networks are more suitable for real-time services. Packet-switched networks are simpler, more efficient, and less costly to implement. They also offer better sharing of transmission capacity than circuit-switched network

Advantages does TDM have over FDM in a circuit-switched network are;

  • In TDM,  all connections operate at the same frequency , but In FDM,   all connections operate at different frequencies
  • In TDM there is low interference between the signals that are being multiplexed as compared to FDM.
  • In TDM, bandwidth is saved by allocating time slots on demand dynamically
  • TDM systems are more flexible than FDM

4 0
3 years ago
Read 2 more answers
design the psuedocode for a program that allows a user to enter 10 numbers, then displays them in the reverse order of their ent
enyata [817]
This is how I would go about it:
1. Ask user to key in numbers. I could take each number in a single line.
2. save each input in a vector.
3. print out the vector starting at location (vector.size()-1) to location 0
8 0
3 years ago
What do you understand by structured programmingapproach? Also Discuss about bottom up and top down approach.
mart [117]

Answer:

Structured programming also known as Modular programming in which the program is made as a single structure.The execution is instruction by instruction.It mainly focuses on improving the quality,clarity and development time of a computer program.

The top-down approach works by breaking a complex algorithm into smaller parts called modules. The modules keep breaking until there is no space left for breaking them without hindering the originality.The breaking of the modules is prohibited after achieving a certain level of modularity . C language uses this approach.

Bottom up works exactly opposite of how the top-down approach works.This approach works in the most elemental level of solving a problem and going up with combination of several parts of the solution to achieve required results.

4 0
3 years ago
What is an example of constructive criticism for an employee who frequently arrives late?
aleksley [76]
I believe the correct answer is A
5 0
3 years ago
Read 2 more answers
What is the full form of bcc please tell​
expeople1 [14]

Blind Carbon Copy

For emails. It is used to send a copy of the email to somebody without the original person receiving it knowing that you sent a copy.

3 0
2 years ago
Read 2 more answers
Other questions:
  • A drivers touches a cars steering wheel on a hot day which term refers to the way heat is transferredd to the drivers hand
    6·2 answers
  • rob just got a new idea for the movie he's making, and he wants to put in late hours to get it done. Which of the following stat
    10·1 answer
  • Over the last few years, security cameras and other devices have become more common. Some people argue that these measures viola
    14·2 answers
  • Which of the following people was a member of FFA?
    7·1 answer
  • You wouldn't think a simple shop like Dippy Donuts would be an interesting target for hackers. But look beyond the donuts and yo
    7·1 answer
  • If there are 18 people in your class and you want to divide the class into programming teams of 3
    7·1 answer
  • The cat store needs your help! The base class Animal has private fields animalName, and animalAge. The derived class Cat extends
    9·1 answer
  • One way to use contiguous allocation of the disk and not suffer from holes is to compact the disk every time a file is removed.
    13·1 answer
  • Where would you go to access frequently used icons?
    12·2 answers
  • I just wanna know how many times a day y'all hit the tutor button at the bottom
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!