can you still receive messages on messenger from a person when you deleted the conversation with them? (But not blocked them)

Answers

Answer 1
Yes









Because you didn’t block them
Answer 2
Yeah you can since they aren’t blocked

Related Questions

Helpppp adapppppopppppp

Answers

Explanation:

(A) trust me I'm computer hecker experts

What is the advantage of learning through story compared to learning through personal experience?

A.
stories are “more real” than personal experience

B.
stories are easier to remember than personal experiences

C.
stories have no rules to follow

D.
you can learn from countless other lifetimes through stories

This is game design

Answers

Answer:

I think the answer would be D

Explanation:

it just seems to make the most sense

Answer:

Is D

Explanation:

Stories open doors which ususally take time to open and to explore in real life, the same thing happens when you use a book to do your homework. You use the book to get information which you don't know. The same is with reading stories, stories can be helpful since they can talk about a characters life mistakes, and experiences that the character has gone throught their life, which usually  might be helpful on real life.

translate ¨friends¨ into spanish

Answers

Friends to Spanish is Amigos

Answer: I hope this is helpful

Explanation:

Friends in Spanish is Amigo- masculine aka male ,noun.
Friend in Spanish is Amiga- feminine aka Female , noun

Friends- trusted and caring person

_______ is a medium-range wireless network. ________ is a medium-range wireless network. Cellular radio LTE UWB Wi-Fi

Answers

Wireless fidelity (Wi-Fi) is known simply as a wired LAN that does not have cables. Wifi is a medium-range wireless network.

WiFi configuration is made of of transmitter with an antenna. It is the wireless access point because it connects to a wired LAN or to satellite dishes that gives an Internet connection.

Wi-Fi is the mostly used type of medium-range wireless communication system.

Medium-range Wi-Fi signal can take about 100 meters and they also not take as far as cellular signals.

Learn more from

https://brainly.com/question/20812811

How is the central message of being true to oneself conveyed in the story?

Answers

The central message of being true to oneself is illustrated in the story as the character allowed his uniqueness to shine through.

You did not provide the story. Therefore, an overview of the central idea will be given. The central message of a story is the main idea that the author wants the readers to know.

The central message is also referred to as the theme. Since the central message is about being true to oneself, the character will respect the opinions of others but won't conform to stereotypes. Such a person allows their uniqueness to shine through.

Read related link on:

https://brainly.com/question/25582903

GUI STANDS FOR__________________

Answers

Explanation:

A graphizaluser interface (GUI) is a type of user interface through which users interact with electronic devices via visual indicator representations.

to determine the highest number in a range of numbers, click insert function box in the formula bar to display the insert function dialog box, then select ____.

Answers

Functions in Excel are used to perform several arithmetic and logical operations.

The text that completes the statement is MAX

From the question, we understand that you want to determine the highest number in a given range of numbers.

This is done using the MAX function.

i.e. after the insert function box has been selected, the formula to use is the MAX function.

Hence, the complete statement is:

Click insert function box in the formula bar to display the insert function dialog box, then select MAX.

Read more about Excel functions and formulas at:

https://brainly.com/question/20497277

The secondary storage device that is LEAST portable is a
A. DVD
B. Flash drive
C. Floppy disk
D. Hard disk

Answers

Answer:

B. flash drive

Explanation:

because it is portable

is invalid in the select list because it is not contained in either an aggregate function or the group by clause.

Answers

Answer:

Column

Explanation:

We _____ information about space. For example, while reading a textbook, we encode the place on a page where certain material appears.

Answers

Answer:

Extremes is the answer for the blank.

Explanation:

How to edit an existing recipient list? class 9 for(3 marks)​

Answers

Answer:

(Archives) Microsoft Word 2003: Mail Merge: Working with the Recipient List

Last updated Monday, Aug. 31, 2020, at 10:35 a.m.

This article is based on legacy software.

For a successful Mail Merge, you will need to establish a recipient list, also referred to as the data source. This contains the information that will vary with each record, such as names or identification numbers. If you are creating a mailing list, for example, names and addresses will be included in your data source.

You can either create a new data source or use a pre-existing source, such as your Outlook Contacts. You may also wish to alter the entries in your data source without having to open it, change the appropriate entries, and then save the changes. Mail Merge allows you to specify which individual entries you want to include as well as add and delete data document entries and fields.

Creating a New Data Source

Before creating the data document, take a moment to plan out the information you want to include. While creating your data document, you can add or remove fields to tailor the document to suit your needs. Creating a new data source is an option in the third step of the Mail Merge Wizard.

Lauren is a network technician monitoring performance on the local area network (LAN). She becomes alarmed when the network utilization reaches 95 percent for a particular time of day. How does she know what the utilization is normally like

Answers

It uses network usage monitoring software to know the level of traffic on that local network.

We can arrive at this answer because:

Network monitoring is an important activity to avoid overloading or underutilizing a local network.This allows the network to be manipulated to promote good performance and provide adequate traffic to users.

To know the level of use of a network it is necessary to use network monitoring software. An example of this type of software is the Capsa Network Analyzer, which also allows the elaboration of strategies to increase, stabilize or decrease network utilization.

More information:

https://brainly.com/question/8118353

This question is worth 15points

Why do you think that computer programs use different data types? Wouldn't it be simpler if they treated all data the same? Why or why not?
What would happen if, for instance, a date were treated like an integer? Please answer all of the questions.

Answers

Answer:

The data type defines wich operations can safely be performed to create, transform and use the variable in another computation.

Computer programs use different data types for efficiency, precision, etc.

Treating all data the same would lead to confusion, inefficiency, and errors.

Treating a date like an integer would result in a loss of semantics, limited operations, etc.

We have,

Computer programs use different data types for a variety of reasons:

- Efficiency:

Different data types allow programs to allocate memory and perform operations more efficiently.

- Precision:

Different data types have different levels of precision. For example, using floating-point numbers allows for decimal values but might introduce rounding errors, while integers are exact but can't represent fractions.

- Semantics:

Different data types convey meaning and help programmers and the compiler understand how the data should be used.

- Operations:

Different data types support different operations. For instance, you can't perform arithmetic operations on text strings as easily as you can on numbers.

- Type Safety:

Using distinct data types helps catch errors early in the development process. If you accidentally treat a string as an integer or vice versa, type systems can catch such errors during compilation.

If a date were treated like an integer:

- Loss of Semantics:

Treating a date as an integer would strip away its meaning. Dates have attributes like day, month, and year, which would be lost if they were treated as integers.

- Limited Operations:

Integers can't directly perform operations related to date manipulation, such as finding the difference between two dates or determining the day of the week for a given date.

- Error-Prone:

Treating dates as integers would likely lead to confusion and errors. It would be easy to make mistakes when handling date-related calculations and comparisons.

- Lack of Flexibility:

Dates have a complex structure, including leap years, varying month lengths, and time zones. Treating them as integers wouldn't allow for representing these complexities.

Thus,

Computer programs use different data types for efficiency, precision, etc.

Treating all data the same would lead to confusion, inefficiency, and errors.

Treating a date like an integer would result in a loss of semantics, limited operations, etc.

Learn more about computer programs here:

https://brainly.com/question/33841076

#SPJ3

Which of these statements is true about text superimposed over a photograph on a
slide?
It should never be done.
It should always be done.
It should have high color contrast.
O It should have low color contrast.

Answers

Answer:

It should have high color contrast.

Translate "God" Into Italian

Answers

Answer:

Dio is god in Italian

Explanation:

hope it helps

Answer:

Dio = God in Italian

: Describe the type of gameplay seen during early video games (ex. Spacewar!, Pong).

Answers

Answer:

Computer scientists began building rudimentary games and simulations on mainframe computers in the 1950s and 1960s, with MIT's Spacewar! in 1962 being one of the first such games to be played with a video display. The first consumer-ready video game hardware arrived in the early 1970s, with the Magnavox Odyssey, the first home video game system, and the first arcade video games from Atari, Computer Space and Pong, the latter of which was later transformed into a home console version. Pong's success in arcades and at home prompted numerous firms to create clones of the game, resulting in a market contraction in 1978 owing to oversaturation and a lack of innovation.

The term ________ refers to software that monitors a user's activity on a computer and on the Internet, often installed without the user's knowledge.

Answers

Answer:

The term spyware refers to software that monitors a user's activity on a computer and on the Internet, often installed without the user's knowledge.

The data cache is where the data read from the database data files are stored _____ the data have been read or _____ the data are written to the database data files.

Answers

Data is known to have cache. The data cache is where the data read from the database data files are stored after the data have been read or before the data are written to the database data files.

Cached data are simply called too be the information that is saved on one's computer or mobile devices after a person have visited or accessed a website.

A lot of Developers often make use of cached data to boast their online experience. A considerable number of consumers often want a website to load within two and three seconds.

Learn more from

https://brainly.com/question/23708299

If you are going to build a custom fast PC for gaming and you need a lot of storage for big video files and videos, but you have a low budget, what storage device(s) option you are going to consider? Why?

Answers

Answer:

Cheap and efficient PC's for two drives

Explanation:

Buying a expensive PC usually runs slower

How were these isometric letters created?

Answers

Answer:

Using the 3D Extrude & Bevel effect.

Explanation:

I just took the test, I got a 100.

Michelle wants to define the scope of a software development project for the benefit of her company. How does defining the scope of a

software development project help a company?


A It helps communicate effectively with the client

B. It helps deliver a project as per the client's requirements.

C It helps prepare a legal agreement

D. It helps decide the project budget

Answers

Answer:

im pretty sure its A

Explanation:

it makes more sense

Answer:

It helps deliver a project as per the client’s requirements.

Trust me... I took the test

why are extensions necessary in scratch programming as a whole?​

Answers

Extensions make it possible to connect scratch projects with eternal hardware

which tool is used to create a selection by drawing it free hand? (ellipse/rectangle/free select/All) ​

Answers

Answer:

The lasso tool

By clicking down and dragging, the lasso tool allows you by freehand to draw the selection line. Many programs offer different types of lasso tools that can be used to make selections. The polygon lasso tool allows you to create a selection by clicking on individual points that connect to create a selection line.

The command used to save a file for the first time and or to save a file with a new file name, location and formatT

Answers

cntrl s dummycntrl s dummycntrl s dummycntrl s dummycntrl s dummy

An Internet address is a unique binary number assigned to a host and used for all communication with the host. Group of answer choices True False

Answers

Answer:

the correct answer is true

You are running the Chrome Web browser and try to open a Web site when you are prompted for login credentials. What TCP/IP model layer is at work that requires you to logon to the Web site

Answers

Considering the situation described above, the TCP/IP model layer that is at work that requires you to log on to the Web site is known as the "Application layer."

The application layer, otherwise known as the abstraction layer, is defined in the Internet Protocol Suite (TCP/IP) and the OSI model.

Also, the application layer determines the shared communications procedures and interface modes utilized by the hosts in a communications network.

Some of the common examples of application layer include the following:

Hypertext Transfer Protocol (HTTP),File Transfer Protocol (FTP),Domain Name System (DNS), etc.

Hence, in this case, it is concluded that the correct answer is "Application layer."

Learn more here: https://brainly.com/question/25278036

Python converts your code into bytecode when you run your program. This process is an intermediate step in a process called.

Answers

Python first compiles your source code (. py file) into a format known as byte code . Compilation is simply a translation step and byte code is a lower level and platform-independent representation of your source code

Python converts your code into bytecode when you run your program. This process is an intermediate step in a process called Compilation.

The line of code returns the ASCII code.

ASCII, has the full form American Standard Code for Information Interchange. It consists of a 7-bit code in which every single bit represents a unique alphabet.

Python is a high-level computer programming language. It is dynamically used.

First, it does a compilation for a file with the extension `.pyc`

Python converts your code into bytecode when you run your program. This process is an intermediate step in a process called Compilation.

Learn more about Python code here:

https://brainly.com/question/34746850.

#SPJ3

Discuss the importance of an operating system as it relates to computer hardware and software. Provide at least one example of a service that operating systems provide.

Answers

Answer:

An operating system is the most important software that runs on a computer. It manages the computer's memory and processes, as well as all of its software and hardware. It also allows you to communicate with the computer without knowing how to speak the computer's language.

Examples:

1. User Interface.

2. Program Execution.

3. File system manipulation.

4. Input / Output Operations.

5. Communication.

6. Resource Allocation.

7. Error Detection.

8. Accounting.

The service known as ___ contains original content in the form of live or recorded streams showing individuals playing video games.

Answers

Twitch is an online service that comprises original content in the form of live or recorded streams and it is typically focused on showing various individuals that are playing video games.

Twitch is an online (web) service that was launched in June 2011 and it derived its name from twitch gaming such as video games that are mainly about fast action and the use of reflexes by the game players.

The main purpose of Twitch is to avail game players the opportunity to stream or show live or recorded videos of themselves playing video games.

Read more: https://brainly.com/question/21694571

una laptop agarra mas internet que una computadora de escritorio?

Answers

una laptop agarra mas internet que una computadora de escritorio?

Su computadora no puede afectar la velocidad de Internet de sus otros dispositivos. ... La única forma en que su computadora puede reducir la velocidad de Internet de otros dispositivos es si no obtiene suficiente velocidad de su ISP y sus dispositivos luchan por un ancho de banda limitado.

^^

Other Questions
people often refer to africa as the dark continent meaning that Africans were uncivilized unsophisticated and ignorant people. west africa east Africa and ancient Zimbabwe are examples that refute this stereotype.the dark continent would not be an accurate label for ancient African. identify the type of writing/essay Which conclusion is best supported by Jacksons article?A.State of the Union addresses will continue to change in the future.A.State of the Union addresses will continue to change in the future.B.Future presidents will look to previous State of the Union addresses for inspiration.B.Future presidents will look to previous State of the Union addresses for inspiration.C.State of the Union addresses will be received in the future with increasing criticism.C.State of the Union addresses will be received in the future with increasing criticism.D.Future presidents will emphasize style over substance in their State of the Union addresses.D.Future presidents will emphasize style over substance in their State of the Union addresses. Slope - Part 1What is the slope of this line?Enter your answer as a whole number or a fraction in simplestform in the boxPlease hurry!! Need help with the question in the picture Which of the following is a possible situation for the graph shown? Use the drop-down menus and your knowledge of suffixes to choose the correct word for each sentence. The searched for artifacts in a field. During the civil war, the country found itself in a state of near. He was when he learned that the director had given the role to another actor. what is the molecular formula of linoleic acid? The radio was created by the Federal Radio Commission in 1934.TrueFalse Is this answer right? If you're a genius then answer this ASAP!!! A proportional relationship is shown in the table below. X: 0 0.3 0.6 0.9 1.2 Y: 0 1 2 3 4 What is the slope of the line that represents this relationship? Graph the line that represents this relationship. can someone please help me please Elizabeth writes down: One multiple of 13; and Two different factors of 77. Elizabeth adds up her three numbers. Her answer is greater than fifty but less than sixty. What three numbers could Elizabeth have written down? Draw Bohr diagrams for the following Is someone able to help!?!? Find the distance of the line 3x + 4y + 5 = 0 from the point (2,-3). Samantha has 7/3 cups of ice cream to make milk shake.Each shake uses 1/8 cup of ice cream. How many milk shakes can she make? Use the completed profile: american reformer sheet for this lesson to answer the following question. Please enter the letter of the choice in the blank. Which reformer did you choose? a. Robert owen b. John noyes c. Lyman beecher d. Horace mann e. Dorothea dix. Read the advertisement for employment.Help Wanted: House sitter needed to watch house while owner is out of town. Job requires overnight stays two to three nights a week, some weeks more. Flexibility is required. Experience preferred. Submit references with rsum. Use the details in the advertisement to answer the big-picture question: "Which person would most likely apply for this job? Lydia is often described as having an easy, laid-back outlook on life. She tends to be very relaxed, is not particularly competitive, and rarely feels or demonstrates anger or hostility. Lydia exemplifies a Type ________ behavior pattern. Apple computers ship their computer parts to India to be made, and station their tech support in India. This is an example of a: