answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
asambeis [7]
2 years ago
7

What is an icon or animation used to represent a participant in an internet chat referred as?

Computers and Technology
2 answers:
HACTEHA [7]2 years ago
8 0
How do i get money because im am so broke it dont make no sence

lesantik [10]2 years ago
3 0
An avatar, is the icon or animation that is used to represent a participant in an internet chat. Avatars are usually customizable to make it more 'you.'
You might be interested in
Jupiter Inc., a software firm, is starting to face competition from the new entrant in its market, Coral Inc. Jupiter wants to p
Scilla [17]

Answer:

A.

Explanation:

Based on the information provided within the question it can be said that in this scenario, Jupiter's best move would be to adopt the measure of ensuring that customers find its software simpler and more convenient to use than that of Coral. This would create satisfaction among the customers which in term would lead to customer loyalty.

8 0
2 years ago
On the attendance worksheet, in cell l5, enter an if function to determine if the percentage in cell k5 is greater than or equal
KatRina [158]

=if(c5≥h18,(c5),(k5))

we will use if function to check the validity of function

we will first write the condition and then we will write the value if condition goes true otherwise if condition does not go true we will write false and function will return value in  k5 cell which we have provided in the formula.

8 0
2 years ago
Read 2 more answers
If the computer has an encrypted drive, a ____ acquisition is done if the password or passphrase is available. a. passive b. sta
Aleonysh [2.5K]

Answer: C. Live

Explanation:

A live acquisition is where data is retrieved from a digital device directly via its normal interface such as activating a computer and initiating executables. Doing so has a certain level of risk because data is highly likely to be modified by the operating system. The process becomes significantly more common likely with less available disk space to the point of completely impractical to image.

7 0
2 years ago
Which computer applications can Mr. Crowell use to make the classroom learning more stimulating and interesting? Mr. Crowell has
katovenus [111]

Answer:

He can use following computer program to make the class room more interesting and effective:-

  • 1. <u>Reference software</u> : This software help students to access the atlases and dictionaries.Teacher can include this software in research projects .

  • 2. <u>Educational Games</u>: This types of software is very effective for younger children because it motivates them to learn.This software companies have combined gaming and education into one .

  • 3. <u>Graphical software</u> : Student can use this software to create and changes images available on the internet itselfs .
4 0
2 years ago
Read 2 more answers
Your license can be canceled if you __________
Gemiola [76]
Your license can be canceled if you do not have proof of insurance or if you have unpaid tickets or fines. Your license can also be canceled if you are behind in child support payments in Florida.
6 0
2 years ago
Read 2 more answers
Other questions:
  • Problem statement: Using loop, write a program that will ask the user to enter a character for left or right. Then, the user wil
    13·1 answer
  • As an information user you should be skeptical of
    7·1 answer
  • It is an array containing information such as headers, paths and script locations wherein it is created by the web server itself
    8·1 answer
  • Why can't you use Friedman's attack on block ciphers?
    12·1 answer
  • Which one of the following is the best example of an authorization control? (a)- Biometric device (b)- Digital certificate (c)-A
    11·1 answer
  • Which statements describe the Sort List feature of Word? Check all that apply.
    5·2 answers
  • The term Electronic Privacy Information Center (EPIC) refers to a form of the digital subscriber line technology, which enables
    6·1 answer
  • Write a function named file_stats that takes one string parameter (in_file) that is the name of an existing text file. The funct
    7·1 answer
  • You should see an error. Let's examine why this error occured by looking at the values in the "Total Pay" column. Use the type f
    14·1 answer
  • The Tell Me feature also includes access to the _____ feature.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!