Chat messages are most likely to be found where on a computer? firewall nic internet history ram

Answers

Answer 1
The answer is RAM.  Chat messages are most likely to be found in the RAM of the computer.  It is Random Access Memory.  RAM is considered volatile memory, which means that the stored information is lost when there is no more power.

Related Questions

The ____ command is useful when you want your shell program to automatically remove any temporary files that are created when the shell script runs.

Answers

The trap command is useful when you want your shell program to automatically remove any temporary files that are created when the shell script runs. The trap command is a basic, but a very beneficial tool. If the script generates temporary files, like a simple script that changes FOO for BAR in entirely files in the existing directory, /tmp file will be clean when you exit the script.

With a switched backbone network, the equipment is usually placed in a ______.

Answers

the equipment would usually be placed in a rack 

With a switched backbone network, the equipment is usually placed in a rack.

what is a rack?Switched backbone network uses a star topology with that it forms one switch at its center.There is a switch serving each LAN of the access layer, which is connected to the backbone switch at the bottom of the distribution layer.The most common type of backbones is used in the distribution layer, used in new buildings, and sometimes in the core layer, which can be rack or chassis based. Shifts many routers of other designs and the backbone has more cables, but fewer devices.It becomes simple to move computers from one LAN to another with the help of rack-mounted equipment.

To learn more about the rack refer to:

https://brainly.com/question/9478859

#SPJ2

What area contains the command used to customize the print options in microsoft excel?

Answers

The answer is Page Layout Ribbon.  The area contains the command used to customize the print options in microsoft excel is Page Layout Ribbon.

A class's ____________ are the statements that define the class's fields, properties, and methods.

Answers

Class Member Declarations

What was/were vannevar bush's main contribution(s) to the development of computer technology?

Answers

Vannevar Bush was an American engineer and information visionary who first imagined home computers and hypertext. During the 1920’s, Bush and his research lab became the very distinguished builders and designers of analog computers. This analog computer was known as the differential analyzer and was used for solving differential equations. Today, Bush is remembered as a prophet in the field of computer science. He published an article and in the article, he proposed a device called Memex, which to the modern reader portends the creation of the World Wide Web and hypertext.




The _________ indicates the number of elements, or values, an array can hold

Answers

The size declarator indicates the number of elements, or values, an array can hold.It is used in a definition of an array.The size declarator must be a constant integer expression with a value greater than zero. A subscript is used to access a specific element in an array. 

A markup language used to create 2-d web documents and pages, including links, is ________. c vrml cgi html

Answers

The answer is HTML

HTML which stands for Hypertext Markup language is the standard markup language that is used to create 2-d web pages. It has codes used to indicate styling and layout. It also lets you insert hypertext links in web pages. Essentially, it describes the structure of web pages using markup.

 






Stream control transmission protocol (sctp) is a new _________ protocol.

Answers

Stream control transmission protocol (sctp) is a new IP transport protocol.

____ are not associated with data from the database and are used to display such things as the report's title

Answers

The answer is unbound controls.

Unbound controls do not have, or are not tied to a source of data or (such as an expression or a field) and are used to display information like pictures, static texts, lines and rectangles. An example of an unbound control is a label that displays the title of a form.



A print spool file is created each time the computer is powered on, just in case you decide to print something.
a. True
b. False

Answers

Final answer:

A print spool file is not created upon powering on a computer; instead, it is created when a user initiates a print job. The print spool manages documents for printing by storing them temporarily, allowing users to work uninterrupted.

Explanation:

The statement that a print spool file is created each time the computer is powered on, just in case you decide to print something, is false. A print spool file is only created when a user initiates a print job. The purpose of a print spool is to manage the documents that are being sent to the printer.

The system spools the print job by storing the document in a temporary file, allowing the user to continue working without waiting for the print job to finish. Once the printer is ready, it retrieves the print job from the spool file and prints the document.

To create a windows to go workspace on a usb drive, which minimum size usb drive is required?

Answers

4go but to create windows you'll need media creation tool don't worry it's free using that you can upgrade the same computer but still you'll need a product key but there's a way to bypass that using kmspico there's tutorials on YouTube so you have to click activate later Hope that helped

One of the most noteworthy e-mail scams was 419, otherwise known as the _______________.​

Answers

Answer:

Nigerian scam

Explanation:

The 419 scam otherwise known as the Nigerian scam encompasses many variations of this type of scam like advance free fraud and fake lottery etc.

hope this is helpful....

You can assign the value of one struct variable to another struct variable of ____ type(s)

Answers

You can assign the value of one struct variable to another struct variable of the same type.

It is like assigning regular variables. You cannot assign int a to char b. They are two different types and have different size memory location. This is true for struct variables. 

All wireless networks have their own name, referred to as the ________, which is used to identify the network.

Answers

All wireless networks have their own name, referred to as service set identifier, which is used to identify the network.

To convey points effectively on a slide, follow the

Answers

Follow the one-by-six-by-six rule (1-6-6) rule

This presentation rule in PowerPoint suggest that you should only have one idea per slide and include no more than six bullet points per slide and no more than six points per line. The goal for this rule is to avoid your slide from being so dense and packed with too much info.



what is the ability to carry out financial transactions using mobile devices such as tablets and phones?

Answers

Mobile banking is the ability of making financial transactions on a mobile device (cell phone, tablet, etc.) anytime, anywhere.The disadvantage for this kind of activity is the security concerns. Creating a secure connection is important or else a client might risk his personal information being jeopardized.

What career in banking or architecture requires a specialized skill?

Answers

manager is probably your best option

In the cis configuration, the methyl groups are placed _____.

Answers

Answer:

In cis configuration, the methyle group are placed on the same side of the Carbon atoms

Explanation:

Cis tran isomerism is also called transformational are term used in organic chemistry.

Cis and Trans are all latin words that means "the side of" or "the other side of".

in cis isomerism, the functional groups e.g methyl or carboxyl groups are situated on the same side of the bond. Here rotation around the bond is highly restricted.

In trans, the functional groups are located at opposite sides of the bond. This configuration allows less restriction around the bond, as opposed to cis.

Digital photography
Need answers to 3 and 4 please :)

Answers

3=C
It is C because if you write the opions down, you will not take the wrong things.


4=B
It is B because adding details will give you more info about the topic.


5. How should you use LinkedIn Answers as a professional?

Answers

The LinkedIn Answers is a component of LinkedIn that allows you to get fast and accurate solutions to your questions. It provides a forum through which you can demonstrate your expertise by offering info to your network. You should use LinkedIn answers to ask and answer questions. Essentially, you should use it to provide examples to your work product, decision making skills, and on an interactive basis.






As an ethical hacker you are capturing traffic from your customer network with wireshark and you need to find and verify just smtp traffic. what command in wireshark will help you to find this kind of traffic?

Answers

The answer is: tcp.port eq 25

What did research conducted in 2009 at Carnegie University Mellon predict?




Information on social networking sites can give most or all digits of a person’s social security number.


Information on social networking sites can give most not all digits of a person’s social security number.

Information on social networking sites can give only some digits of a person’s social security number.


Information on social networking sites cannot give away the digits of a person’s social security number.

Answers

A.Information on social networking sites can give most or all digits of a person’s social security number.


How do you work out a lookup and an if function on an excel spreadsheet?

Answers

In column A, put the codes of the products to look up. In column B, put the product name. In column C, put the price.

If you need to use a custom theme frequently, you can save a presentation file as a(n) ____ theme file.

Answers

A theme is a coordinated set of colors, fonts, backgrounds, and effects.
An installed theme can be accessed and applied by clicking on a theme in the Themes group on the Design tab. 
If you need to use a custom theme frequently, you can save a presentation file as a(n) Office theme file.

Answer:

office

Explanation:

It is the basic documentary unit of office files and of which most of the documents are part. Administrative file means the ordered set of documents generated or produced by an office (producer) in the administrative resolution of the same matter.

It will reflect the formalization of an administrative procedure. Therefore, a file must group all the documents generated in the different phases of a procedure, from the initiation, ex officio or part, to the execution, including the documentation related to revisions, suspensions, revocations or resources that the resolution of the procedure could generate.

A number used to encrypt data is called a(n ________. signature key cookie escrow

Answers

The answer would be a key. Everything that is encrypted (unless it is 1 way encryption which is never used) requires a key. Without it, how would computers or people read the encrypted data? Good luck!

What is the difference between a form header and a page header?

Answers

A form header is always displayed on the screen of the computer. it can be useful in the display of independent information that concerns the current record. However, the page header is not displayed on the screen of computer but in every printout it is printed on the top.

Which remarketing audiences can be defined in google analytics? (select all that apply)?

Answers

The remarketing audiences that can be defined in google analytics are :     
1) Users who played a video on your website
2) Users who purchased a product on your website
3) Users who visited a specific page on your website

For film editors, which task comes last in their workflow pattern?

editing

rendering

digital grading

color correction

Answers

B. Rendering
Hope this helps
B. Rendering absolutely for sure

the four levels of administration necessary to keep human services organization operating smoothly.

Answers

The four levels of administration that is necessary to keep human services organization run smoothly are; 1. Top management, 2. Middle management, 3. Lower management,4. Operational management.

In object-oriented programming, what is a class?

Answers

Basically, a class in Object-oriented programming is a blueprint of an object. You can think of it as a concept and the object is the embodiment of that concept. It is a set of instructions to build a particular type of object and will normally define how an object will behave and what it will contain when it is instantiated.

Answer:

In object-oriented programming, a class is a blueprint for creating objects (a particular data structure), providing initial values for state (member variables or attributes), and implementations of behavior (member functions or methods).

The user-defined objects are created using the class keyword. The class is a blueprint that defines a nature of a future object. An instance is a specific object created from a particular class. Classes are used to create and manage new objects and support inheritance....a key ingredient in object-oriented programming and a mechanism of reusing code.

Other Questions
Please help :)Solve the system of equations and choose the correct answer from the list of options.d + e = 1 d + e = 5Label the ordered pair as (d, e). (4 points)(0, 0)(3, 2)(2, 3)(3, 0) A battery charger delivers a current of 5.8 a for 2.9 h to a 12-v storage battery. what is the total charge that passes through the battery in that time According to freud, what does the ego unconsciously use to avoid recognizing uncomfortable ideas or emotions? A suspected benefit of a literacy background that includes poetry experience is help with maths please Donne, Jonson, and Shakespeare all use figurative language to guide the reader. How does Shakespeare's treatment, in his sonnet, differ from that of the other authors? A.His intention is metaphorical. B.His intention is allegorical. C.His intention is satirical. D.His intention is political. Art mows 1/8 acre in 1/4 hour. hOw many acres does art mow per hour The equation $1.50p + $5.00 = $14.00 shows the total cost of picking p pounds of blueberries at a local blueberry farm. how many pounds of blueberres were picked/ A cylindrical tank has a radius of 4.5 ft and an altitude of 14 ft. If a gallon of paint will cover 130 ft squared ft2 of surface, how much paint in gallons is needed to put two coats of paint on the entire surface of the tank? Aswer: To put two coats of paint on the entire surface of the tank, ______ full gallons of pain are needed. Give an example from this chapter (24) of how scout is maturing. Include page number and quote and explain why you think this shows her maturity (from to kill a mockingbird) A student is asked to write a critique of this excerpt from Utopia. If these metals were laid up in any tower in the kingdom it would raise a jealousy of the Prince and Senate, and give birth to that foolish mistrust into which the people are apt to falla jealousy of their intending to sacrifice the interest of the public to their own private advantage. If they should work it into vessels, or any sort of plate, they fear that the people might grow too fond of it, and so be unwilling to let the plate be run down, if a war made it necessary, to employ it in paying their soldiers. To prevent all these inconveniences they have fallen upon an expedient which, as it agrees with their other policy, so is it very different from ours, and will scarce gain belief among us who value gold so much, and lay it up so carefully. They eat and drink out of vessels of earth or glass, which make an agreeable appearance, though formed of brittle materials; while they make their chamber-pots and close-stools of gold and silver, and that not only in their public halls but in their private houses. Of the same metals they likewise make chains and fetters for their slaves, to some of which, as a badge of infamy, they hang an earring of gold, and make others wear a chain or a coronet of the same metal; and thus they take care by all possible means to render gold and silver of no esteem . . . Which is a critique of the excerpt? Gold earrings are given to enslaved people and seen as cause for shame. The effects of slavery are much worse than the effects of materialism. To show their disdain for gold and silver, Utopians use them for chamber pots. Utopians make a great effort to treat precious metals for everyday purposes. Choose the correct conditional tense form of comer.Nosotros _____ con la maestra.comeracomerascomeramoscomeran Ella is cooking a turkey and a ham for Thanksgiving. It takes 15 minutes per pound to cook a turkey and 23 minutes per pound to cook a ham. Ella is able to cook the turkey and the ham in 5 hours and 18 minutes. If the turkey weighs twice as much as the ham, how much do the turkey and the ham weigh? how can citations lend credibility to your worka. they show that you have done the necessary research to back up your thesisb. they show that researchers have allowed you access to their workc. they increase the technical complexity of the overall paperd. they display conformity with accepted style and usage guidelines Since the first mental age tests were administered in 1904, there have been several versions of intelligence tests. The most widely used test today is the Wechsler Intelligence Scale. Why did David Wechsler design the Wechsler Intelligence Scale? one more question please help me!!! which graph shows the solution set of the compound inequality 1.5x-1>6.5 or 7x+3 Carole seems to be incredibly healthy; she is able to resist illness no matter how much stress she is under. she tends to fully involve herself in whatever she is doing, she believes that change is normal and that she has control over the course of her life. psychologists would say that carole has Costs for standard veterinary services at a local animal hospital follow a normal distribution with a mean of $88 and a standard deviation of $24. what is the probability that one bill for veterinary services costs between $42 and $133? ( PLEASE HELP) The points (3,-2) (-3,-2) and (-3,6) are the vertices of a triangle. Find the perimeter of the triangle. (Hint: Use the Pythagorean theorem to find the length of the hypotenuse.