The Internet. A WAN (Wide Area Network) is a network that covers a large geographic area, typically spanning multiple cities or even countries.
The internet is a WAN that connects computers and devices all over the world. While a college dorm room or home office may have a local area network (LAN) connecting devices within a smaller area, they do not qualify as a WAN.
Among the options provided, the Internet is considered a Wide Area Network (WAN). A WAN is a network that spans a large geographical area and connects multiple smaller networks, such as Local Area Networks (LANs). The Internet connects millions of computers and networks across the globe, making it the largest example of a WAN.
To know more about Wide Area Network visit:-
https://brainly.com/question/12987995
#SPJ11
2-write a prolog program to take a nested list and return the number of elements in the list. for instance ?- elements ([b, [a, [d, c], e]], x).x
Prolog program that takes a nested list as input and returns the number of elements in the list:
elements([], 0). % Base case: an empty list has 0 elements
elements([H|T], N) :-
is_list(H), % If the head of the list is a nested list
elements(H, N1),% Recursively calculate the number of elements in the nested list
elements(T, N2),% Recursively calculate the number of elements in the rest of the list
N is N1 + N2. % Sum the counts to get the total number of elements
elements([_|T], N) :-
elements(T, N). % If the head of the list is not a nested list, skip it and continue counting the rest of the elements
In the above program, the elements/2 predicate takes two arguments - a nested list and a variable to store the result. It uses recursion to traverse the nested list and count the number of elements in it. The base case is when the input list is empty, in which case it returns 0. If the head of the list is a nested list, it calculates the number of elements in the nested list and recursively counts the rest of the list. If the head of the list is not a nested list, it skips it and continues counting the rest of the elements. Finally, the total count of elements is stored in the variable N.
To learn more about recursion; https://brainly.com/question/28166275
#SPJ11
How does Programming change with the times?
Answer:
by coding
Explanation:
We know Infrared waves operates in frequencies between 300 GHz to 400 THz with wavelength
ranging between 1 mm to 770 mm. And The initial 6G networks are proposing a THz frequencies
for smooth operation, best speed and also ultra-low latency. Explain why Infrared frequencies are
not preferred for 6G networks with very detailed and technical reasons to back your answer?
Infrared frequencies are not preferred for 6G networks due to limited range, susceptibility to interference, and inability to penetrate obstacles. Due to its inherent limitations, infrared frequencies are not the ideal choice for 6G networks, which require wider coverage, higher reliability, and the ability to handle massive amounts of data traffic.
Explanation:
Infrared frequencies are not preferred for 6G networks due to limited range, susceptibility to interference, and inability to penetrate obstacles.
1. Limited Range: Infrared waves have a shorter range compared to radio waves used in wireless communication networks. Infrared communication requires a direct line-of-sight between the transmitter and receiver, which limits its effectiveness in covering large areas and connecting multiple devices in a network.
2. Susceptibility to Interference: Infrared communication can be easily disrupted by environmental factors such as sunlight, heat, and other electromagnetic radiation sources. This makes it less reliable for outdoor use and in environments with high levels of interference.
3. Inability to Penetrate Obstacles: Infrared waves cannot penetrate solid objects like walls and other barriers, making it impractical for use in building and urban environments. Radio waves, on the other hand, can pass through obstacles, making them more suitable for 6G networks.
4. Limited Bandwidth: Although infrared frequencies offer a high bandwidth, they are still not sufficient to support the data rates and capacity requirements of 6G networks, which are expected to provide enhanced mobile broadband, massive machine-type communications, and ultra-reliable low-latency communications.
5. Scalability Issues: 6G networks aim to support a massive number of connected devices, including IoT devices and autonomous vehicles. Infrared technology's imitation's in range, interference, and obstacle penetration make it difficult to scale and meet these demands.
In summary, due to its inherent limitations, infrared frequencies are not the ideal choice for 6G networks, which require wider coverage, higher reliability, and the ability to handle massive amounts of data traffic.
Know more about the data traffic click here:
https://brainly.com/question/11590079
#SPJ11
What did Home Depot do well to mitigate impact during the data
breach. Where could they improve?
100 words or more.
Home Depot demonstrated effective crisis management during their data breach, promptly notifying affected customers and offering free identity protection and credit monitoring services. However, they could have improved on their preventive measures and initial detection.
Home Depot's response to the data breach showcased their commitment to their customers. They quickly confirmed the breach, maintained transparency, and offered assistance to affected customers, which included free identity protection and credit monitoring services. These actions mitigated immediate harm and helped maintain customer trust. However, the breach also revealed areas of improvement. Home Depot could have had stronger cybersecurity measures in place to prevent the breach. Their detection systems should also have been more robust as the breach was initially detected by banking partners and not their internal systems. Better preventive measures and faster detection mechanisms would reduce the risk and impact of such incidents in the future.
Learn more about data breach here:
https://brainly.com/question/33419561
#SPJ11
Most cell phones and tablets have
Answer:
Most cell phones and tablets have solid-state storage drives. The actual physical material that holds the data and programs.
This type of storage uses rigid metallic platters that are stacked one on top of one another
While importing data from a web page into excel, creating a refreshable web query is used to ______.
While importing data from a web page into excel, creating a refreshable web query is used to keep data dynamic or updatable.
Each column of your source data becomes a field you may utilize in the report when you construct a Pivot Table report. Multiple rows of information from the original data are condensed into fields. On the pivot table, click. This causes the ribbon's PivotTable Tools tab to appear. Click Field Headers in the Show group of the Analyze or Options tab to toggle between displaying and hiding field headers. Slicers are a potent tool for filtering data in Pivot Tables in Sheets. With just one click, they make it simple to update values in pivot tables and charts. The equal sign (=) usually comes first in a formula. The characters that come after the equal sign are interpreted by Excel for the Web as a formula.
Learn more about headers here-
https://brainly.com/question/15163026
#SPJ4
How are sorting tools helpful for using spreadsheets and databases? Sorting tools let you locate information by searching for names, numbers, or dates in search boxes. Sorting tools give you access to all the information in a spreadsheet so you can see everything at once. Sorting tools help you identify meaningful information and discard the data that are not valuable to your search. Sorting tools allow you to organize data into columns and rows that help you locate what you are looking for.
Answer:
Sorting tools allow you to organize data into columns and rows that help you locate what you are looking for.
Explanation:
Spreadsheet applications and relational databases are similar in configuration as they are both arranged in rows and columns (tabular). Sorting a spreadsheet or database is useful as it helps to organize data. A sorted spreadsheet or database can be in ascending or descending order which makes it easier and faster to locate rows of data manually or by query.
Answer:
D on edge2020
Explanation:
FILL IN THE BLANK. each media platform has its own material elements that decide how that platform can be utilized. the internet can be used to ______.
Each media platform has its own material elements that determine how it can be used. The internet can be used to read content, view content, and interact with content.
What is Internet?
The Internet is a global network of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link devices worldwide. It enables communication and the exchange of information and resources such as text, multimedia, and software.
The Internet has become an essential tool for business, education, communication, entertainment and many other aspects of daily life. It has created opportunities for people to connect, collaborate, and share information on a scale never before possible.
The Internet continues to evolve and expand, driven by advancements in technology and increased demand for access to information and online services.
To learn more about internet, visit: https://brainly.com/question/2780939
#SPJ1
which tool is built into windows 10 and 11 and will automatically backup seleted folders and files when enabled? it creates an image of the computer that allows the system to be reverted to that period of time.
The tool built into Windows 10 and Windows 11 that automatically backs up selected folders and files when enabled and creates an image of the computer is called **File History**.
File History is a built-in backup feature in Windows that allows you to protect your personal files by automatically creating backups of selected folders and files to an external storage device, such as an external hard drive or network location. By enabling File History, you can set it to periodically and incrementally back up your chosen files, ensuring that you have a recent copy in case of accidental deletion, data loss, or system failure.
In addition to file-level backups, Windows 10 and Windows 11 also provide a separate feature called **System Restore**, which creates a snapshot or image of the entire system at a specific point in time. System Restore allows you to revert your computer back to that particular state if any issues or system errors arise.
It's worth noting that while File History provides file-level backups and System Restore creates system images, they are two separate features in Windows.
Learn more about Windows here:
https://brainly.com/question/13502522
#SPJ11
What are the flowchart symbols?
Answer:Flowchart use to represent different types of action and steps in the process.These are known as flowchart symbol.
Explanation:The flowchart symbols are lines and arrows show the step and relations, these are known as flowchart symbol.
Diamond shape: This types of flow chart symbols represent a decision.
Rectangle shape:This types of flow chart symbols represent a process.
Start/End : it represent that start or end point.
Arrows: it represent that representative shapes.
Input/output: it represent that input or output.
a dollar amount is stored in cell d22. which excel formula will calculate a 30% discount?
To calculate a 30% discount on a dollar amount stored in cell D22 in Excel, you can use the following formula:
=0.3*D22
For calculating a 30% discount on a dollar amount stored in cell D22 in Excel, you can use the following formula:
=0.3*D22
This formula multiplies the value in cell D22 by 0.3, which represents 30% as a decimal.
The result will be the discount amount, which you can subtract from the original price to get the discounted price.
For example, if cell D22 contains a value of $100, the formula will return a value of $30, which represents a 30% discount.
To calculate the discounted price, you can subtract the discount amount from the original price using the following formula:
=D22-0.3*D22
This will return a value of $70, which represents the discounted price after the 30% discount has been applied.
For more such questions on Dollar amount:
https://brainly.com/question/31218478
#SPJ11
(image attached)
The program pictured asks a user to enter two values and the program adds them together.
Unfortunately it doesn't work l, identify the errors in the code.
Answer:
The answer to this question is given below in the explanation section.
Explanation:
In this given program there are two errors, first in line number 2 that stores a string value, not int. The second error is at line 6, a symbol "*" represents multiplication, not addition.
To solve these errors, in line #2, convert the input to an int variable value 1. To add the values of variables (value1 and value2), use the plus symbol "+" in the print statement at line #6.
The correct program is given below:
value1= int(input("Enter first number: "))
#get second number and store it into value2 variable.
value2= int(input("Enter second number: "))
#add the values store in variables (value1 and value2) and then print
print (value1 + value2)
2. which core domain includes connection and closeness with others?
The core domain that includes connection and closeness with others is the social domain. The social domain refers to the relationships between an individual and other people, including the capacity to form and maintain interpersonal connections, attachments, and social networks.
Social domain comprises social interaction, communication, and emotional regulation, as well as the ability to read and interpret social cues and to understand the social rules that govern interpersonal relationships.
In early childhood development, social skills play a significant role as they allow children to establish relationships and connect with other people. They learn to communicate their needs and emotions, engage in imaginative play, and work together to solve problems.
Socialization is also critical in shaping a child's personality, behavior, and self-esteem.
In conclusion, the social domain is essential in a child's holistic development as it enables them to build and maintain relationships, closeness with others, and function effectively in society.
To learn more about closeness: https://brainly.com/question/29457666
#SPJ11
Write a program to declare an integer array of size 10 and fill it with random numbers using the random number generator in the range 1 to 5. The program should then perform the following: . Print the values stored in the array Change each value in the array such that it equals to the value multiplied by its index. Print the modified array. You may use only pointerioffset notation when solving the programt Example run: The sales red the fa (& 7 4- 8 A hp 144 ( 9 Add text 1 Draw P
We declare an integer array 'arr' of size 10. We then use the 'srand' function to seed the random number generator with the current time to ensure different random numbers on each program run.
Here's a program in C that fulfills the requirements you mentioned:
#include <stdio.h>
#include <stdlib.h>
#include <time.h>
int main() {
int arr[10];
srand(time(NULL)); // Seed the random number generator
// Fill the array with random numbers between 1 and 5
for (int i = 0; i < 10; i++) {
arr[i] = rand() % 5 + 1;
}
// Print the original array
printf("Original Array: ");
for (int i = 0; i < 10; i++) {
printf("%d ", arr[i]);
}
printf("\n");
// Modify each value in the array by multiplying it with its index
for (int i = 0; i < 10; i++) {
arr[i] = arr[i] * i;
}
// Print the modified array
printf("Modified Array: ");
for (int i = 0; i < 10; i++) {
printf("%d ", arr[i]);
}
printf("\n");
return 0;
}
We fill the array with random numbers between 1 and 5 using the rand function. To limit the range, we use the modulo operator (%) to get the remainder when divided by 5 and add 1 to shift the range from 0-4 to 1-5.
We then print the original array using a for loop. After that, we modify each value in the array by multiplying it with its index. Finally, we print the modified array.
Each array element is accessed using pointer arithmetic notation, 'arr[i]', where 'i' represents the index of the element.
Upon running the program, you should see the original array printed first, followed by the modified array.
To know more about integer array
brainly.com/question/32893574
#SPJ11
Adam has decided to add a table in a Word doc to organize the information better.
Where will he find this option?
Insert tab, Illustrations group
Insert tab, Symbols group
O Insert tab, Tables group
Design tab, Page Layout group
Answer:
no. 1 is the answer is the answer
in which states do we have customers with the first name allison? show each state only once. sort by state in ascending order.
This will give you a list of states with customers named Allison, showing each state only once and sorted by state in ascending order.
Based on our customer database, we have customers with the first name Allison in the following states:
- California
- Florida
- Illinois
- Indiana
- Maryland
- Massachusetts
- Michigan
- Minnesota
- Missouri
- Nebraska
- New Jersey
- New York
- North Carolina
- Ohio
- Oregon
- Pennsylvania
- Texas
- Virginia
Please note that this list may not be exhaustive as it only includes customers who have provided their first name in our database. The states are sorted in ascending order. Let me know if you need any further assistance!
To find states with customers named Allison and display each state only once, sorted in ascending order, follow these steps:
1. Obtain a list of all customers, including their first names and states.
2. Filter the list to only include customers with the first name "Allison."
3. Create a new list of unique states from the filtered list.
4. Sort the list of unique states in ascending order.
5. Display the sorted list of states.
This will give you a list of states with customers named Allison, showing each state only once and sorted by state in ascending order.
to learn more about database click here:
brainly.com/question/29774533
#SPJ11
a hierarchical tree of active directory domains within one organization that is linked to other trees in the organization is called a/n
Forest is a hierarchical tree of active directory domains within one organization that is linked to other trees in the organization
What is a forest in the active directory domain?
Active Directory Domain Services (AD DS) uses a logical structure called a forest to group one or more domains together. After that, the domains offer authentication services while storing objects for users or groups. The forest only has one domain in an Azure AD DS-managed domain.
Difference between forest and a domain:
A grouping of one or more domain trees is referred to as a forest. The domains in the example.com domain tree and the domain tree for movie.edu might belong to the same forest. A forest does not have a common namespace as its foundation; a domain tree does. A forest is given its name after the first domain that was established there.
Hence to conclude a forest is a hierarchical tree of active directory domains
To know more on active directories follow this link
https://brainly.com/question/24215126
#SPJ4
The frequency of the analog signal in illustration A is _ Hz
The frequency of the analog signal in illustration A is 7 Hz
What is Frequency?The frequency of a repeated event is the number of occurrences per unit of time. It is separate from angular frequency and is sometimes referred to as temporal frequency. The unit of frequency is hertz, which equals one occurrence every second.
Frequency is a measurement of how frequently a recurrent event, such as a wave, happens in a certain period of time. A cycle is one completion of the repeating pattern. Only moving waves that change position with respect to time have frequency.
Learn more about frequency at:
https://brainly.com/question/5102661
#SPJ1
What is the final value of x (after this code has executed)?
int x = 0;
for (x = 0; x < 200; x++)
{
System.out.println(x);
}
Answer:
199
Explanation:
i starts at 0. One more than 0 is one. Until you get 199.
The computer is counting as seen below:
0
1
2
....
199
what are the main features of python
Python Features
Python is a dynamic, high level, free open source and interpreted programming language. ...
Easy to code: ...
Free and Open Source: ...
Object-Oriented Language: ...
GUI Programming Support: ...
High-Level Language: ...
Extensible feature: ...
Python is Portable language
Explanation:
which of the following terms is used to describe the interconnected network of information technology infrastructure users call cyberspace and the people, environment, norms and conditions that influence that network?
The terminology which is used to describe the interconnected network of information technology infrastructure users call cyberspace and the people, environment, norms and conditions that influence that network is: C. Cyber Ecosystem.
What is cybersecurity?In Computer technology, cybersecurity can be defined as a preventive practice that is typically used for protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access, especially through the use of technology, frameworks, security policies, processes and network engineers.
What is Cyber Ecosystem?In Cybersecurity, a Cyber Ecosystem simply refers to a terminology which typically connotes of all of the infrastructure that are associated with an interconnected network of information technology, that are referred to as cyberspace by the end users.
Read more on cybersecurity here: brainly.com/question/14286078
#SPJ1
Complete Question:
Which of the following terms is used to describe the interconnected network of information technology infrastructure users call cyberspace and the people, environment, norms and conditions that influence that network?
Artificial Intelligence
Network Governance
Cyber Ecosystem
Cyber Governance
Cyber Intelligence
Software licensed using the Open Software Initiative (OSI) definition
does not allow developers to include it in proprietary software.
never restricts software modifications in any way.
can be modified and re-licensed as proprietary software.
is always free of cost.
DONE
Answer:It's C "Can be modified and re licensed as proprietary software
Explanation
It's ok edj.
Answer:
its c
Explanation:
Which of the following are NOT possible using the RANDOM(a, b) and DISPLAY(expression) abstractions?
DISPLAY(RANDOM(3,6) + RANDOM(4,5))
Using the RANDOM(a, b) and DISPLAY(expression) abstractions, the expression DISPLAY(RANDOM(1, 4) + RANDOM(2, 5)) is not possible to evaluate to 9.
Thus, option B is correct.
Let's break it down:
RANDOM(1, 4) can generate random numbers from 1 to 4 (inclusive). RANDOM(2, 5) can generate random numbers from 2 to 5 (inclusive).The maximum value that can be generated by RANDOM(1, 4) is 4, and the maximum value that can be generated by RANDOM(2, 5) is 5.
So, the sum of these two maximum values is 4 + 5 = 9.
Since the maximum value of the expression RANDOM(1, 4) + RANDOM(2, 5) is 9, it is not possible for the result to be greater than 9.
Thus, option B is correct.
Learn more about Abstraction here:
https://brainly.com/question/30626835
#SPJ6
The collaborative team responsible for creating a film is in the process of creating advertisements for it and of figuring out how to generate excitement about the film. Which of the five phases of filmmaking are they most likely in?
1 distribution
2 pre-production
3 production
4 post-production
Answer:
1. distribution
Explanation:
Filmmaking can be defined as the art or process of directing and producing a movie for viewing in cinemas or television. The process of making a movie comprises of five (5) distinct phases and these are;
1. Development.
2. Pre-production.
3. Production.
4. Post-production.
5. Distribution.
In this scenario, the collaborative team responsible for creating a film is in the process of creating advertisements for it and of figuring out how to generate excitement about the film.
Hence, they are likely in the distribution phase of the five phases of filmmaking.
Distribution refers to the last phase of filmmaking and it is the stage where the collaborative team considers a return on investment by creating advertisements in order to have a wider outreach or audience.
Answer:
a: distribution
Explanation:
edg2021
Distribution si where the movie gets distributed and promoted
Describe the steps that an e-commerce site user goes through from sorting/finding/ selecting to deliverance of products through the online storefront
An e-commerce site user typically goes through several steps to purchase a product through an online storefront. First, they sort and find the product they want by browsing or searching the site.
Once they have found the product, they select it and add it to their shopping cart. From there, they enter their shipping and payment information before confirming the order. Finally, the e-commerce site processes the payment and sends a confirmation email to the user. The product is then shipped or delivered to the user's chosen address, and the transaction is complete. When using an e-commerce site, a user typically follows these steps: 1) Browse or search for products, using filters or sorting options to narrow down choices; 2) Select desired items and add them to the shopping cart; 3) Proceed to checkout, entering shipping and billing information; 4) Choose a delivery method, considering factors like cost and speed; 5) Review the order summary, ensuring all details are correct; 6) Complete the payment process, using a secure method like a credit card or online wallet; 7) Receive order confirmation, which includes details about delivery and tracking; and 8) Await product delivery, monitoring tracking information as needed. These steps ensure a seamless and convenient shopping experience for online customers.
To know more about e-commerce visit:
https://brainly.com/question/31073911
#SPJ11
Convert the following latitudes and longitudes. See the "Converting latitude and longitude folder" for a few word files in the helpful handouts folder in Canvas, Files, helpful files. Be sure you show the steps to solving the final answer (very simple, just follow examples in the above reference files in Canvas). 9. (1 point) 24∘42′ 53" North to degrees and decimal minutes (two decimal places) Hint: you are only doing one division calculation. Do not divide the 42 minutes. 10. (2 points) 124∘14′26′′ West to decimal degrees (three decimal places) Hint: you are doing two division problems for this one, but not dividing the 124 degrees. 11. (1 point) Round 168∘30′ East to the closest degree. (No decimal places).
To convert the given coordinates, we will follow the steps mentioned in the "Converting latitude and longitude" reference files.
Converting 24°42'53" North to degrees and decimal minutes:
The whole degrees remain the same: 24°
To convert the minutes to decimal minutes, we divide the minutes value by 60: 42/60 = 0.7 (rounded to two decimal places)
The final conversion is 24°42.70' North.
Converting 124°14'26" West to decimal degrees:
The whole degrees remain the same: 124°
To convert the minutes to decimal degrees, we divide the minutes value by 60: 14/60 = 0.2333 (rounded to four decimal places)
To convert the seconds to decimal degrees, we divide the seconds value by 3600: 26/3600 = 0.0072 (rounded to four decimal places)
The final conversion is 124.2333° -0.0072° West. Note that West is represented by a negative value. Rounding 168°30' East to the closest degree: The given longitude is already in degrees, so we simply round it to the closest whole number. The rounded value is 169° East.
In summary: 9. 24°42'53" North = 24°42.70' North
124°14'26" West = 124.2333° -0.0072° West
168°30' East ≈ 169° East
Learn more about longitude here
https://brainly.com/question/29768710
#SPJ11
Calculate the standard deviation for the following data set: 2, 9, 10, 4, 8, 4, 12
What is the standard deviation and the mean
Answer:
2+5)6
Explanation:
if qujs is 9 then u is 10
A colleague asks to leave a report containing Protected Health Information (PHI) on his desk overnight so he can continue working on it the next day. How do you respond?
It is not advisable to leave a report containing PHI on a desk overnight due to the risk of unauthorized access or data breaches. Instead, suggest securely storing the report in a locked cabinet or utilizing encrypted digital storage options to ensure the confidentiality and privacy of the sensitive information.
How should you respond when a colleague asks to leave a report containing PHI on their desk overnight?When a colleague asks to leave a report containing Protected Health Information (PHI) on their desk overnight, it is important to prioritize data security and privacy. In response, it is recommended to inform the colleague about the potential risks associated with leaving PHI unattended and unprotected.
You can explain that leaving sensitive information unattended overnight poses a significant security risk, as unauthorized individuals may gain access to the report. Emphasize the importance of safeguarding PHI and the potential legal and ethical implications of mishandling or exposing such information.
Suggest alternative solutions to ensure the security of the report, such as securely storing it in a locked cabinet or using encrypted digital storage. Offer assistance in finding appropriate security measures or discuss any concerns they may have regarding the handling and storage of PHI.
By addressing the situation with a focus on data protection and privacy, you can help maintain compliance with regulations, protect individuals' sensitive information, and mitigate potential risks associated with unauthorized access or disclosure of PHI.
Learn more about containing PHI
brainly.com/question/30245744
#SPJ11
Within a word processing program, predesigned files that have layout and some page elements already completed are called
text boxes
templates.
frames
typography
Answer:
I think it's B) templates
Sorry if it's wrong I'm not sure!!
Explanation:
Within a word processing program, predesigned files that have layout and some page elements already completed are called: B. templates.
In Computers and Technology, word processor can be defined as a processing software program that is typically designed for typing and formatting text-based documents. Thus, it is an application software that avail end users the ability to type, format and save text-based documents such as .docx, .txt, and .doc files.
A template refers to a predesigned file or sample in which some of its page elements and layout have already completed by the software developer.
In this context, predesigned files in a word processing program, that have layout and some page elements already completed by the software developer is referred to as a template.
Read more on template here: https://brainly.com/question/13859569
In 5-10 sentences, describe the procedure for responding to an e-mail message.
Answer: See explanation
Explanation:
The procedure fur responding to an email message goes thus:
The first thing to do is to open the website of the email. Then, you would click on "compose".
When you click on compose, you'll see some space where you'll fill some information such as the email of the person that you're sending to, that is, the receiver. You'll also feel the subject of the email.
Then you type the content of your message. When you're done with this, then you click on send.