answersLogoWhite

0

Is it SMS's or SMSs

Updated: 10/3/2023
User Avatar

Wiki User

11y ago

Best Answer

"An sms" is correct. In the English language "an" is used when the next word begins with a vowel or with a word which has phonetically vowel sound. Ex.- An MBA

User Avatar

Wiki User

15y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

11y ago

It is SMS's.

An apostrophe can be used for a plural in the case of abbreviations, acronyms and symbols. So for example, to "mind your p's and q's", and "DVD's".

This answer is:
User Avatar

User Avatar

Anonymous

Lvl 1
3y ago

am sms

This answer is:
User Avatar

User Avatar

Anonymous

Lvl 1
3y ago

an sms

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Is it SMS's or SMSs
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What does spam number mean?

A spam number refers to a number that makes unsolicited calls or sends you junk SMSs.


How can you block unwanted SMSs on your mobile phone?

Hey check out killermobile.com for some great apps.. they have one such app that will solve your problem - hopefully!!


How would you prove a sexual harassment case?

Excepted proof could be in the form of SMSs, taped phone calls or conversations or written requests for such liaisons.


How do you delete sent messages in site2sms?

You would have to figure out a way to log into there account and delete it from there mail. Sorry.


What has the author A van Wambeke written?

A. van Wambeke has written: 'Calculated soil moisture and temperature regimes of South America' -- subject(s): Soil moisture, Soil temperature, Soils 'Calculated soil moisture and temperature regimes of Africa' -- subject(s): Maps, Measurement, Soil moisture, Soil temperature, Soils 'Soil moisture and temperature regimes of Central America, Caribbean, Mexico (SMSS technical monograph)' 'Management properties of ferralsols' -- subject(s): Ferralsols, Red soils, Soils


How will a girlfriend come back to you after a breakup?

write a song or do something realy romantic for them : Doing something romantic is a good idea but you need to be careful of how you do it. You ex girlfriend will not be interested if you appear to be crawling back to her. What you need to do is concentrate on yourself, making sure you project a confident attitude. Be well groomed, dress well and show you can be independent. Your self esteem is more than likely low after the breakup and you need to work on building it up. Go out with friends and family and have fun. If she sees you out and about she will start to wonder what she is missing. Keep in contact with her but don't overdo it by harassing her with constant SMSs and phone calls. When you do contact her be understanding, listen to what she has to say (you might find out why you broke up). Be sympathetic, helpful and above all don not put pressure on her to do anything.


How does SIM card receive signals?

A SIM (Subscriber Identity Module) Card works by storing information about your phone service (e.g. your phone number) so that the phone it is inserted into knows what service and account to use. You cannot call text or socially use your phone without one


Back Up Your Android Phone?

Back up your Android phoneCongratulations! You're the proud owner of a shiny new Android phone! But, like they say, with great reception comes great responsibility. If your phone is lost, stolen, or destroyed (dropped, damaged by a spill, or what have you), you're going to lose all your information... unless you have it backed up. Here's how to keep your data safe.Don't Procrastinate!: We all do it, but it only takes one moment of butterfingers, one bath in your coffee cup, or one pickpocket to compromise your data. With that in mind, you should back up your data ASAP! Should the worst happen, you'll be glad you took the time beforehand.Rooted or Un-Rooted?: Your Android may or may not be rooted. It's okay if you're not sure - just call customer service. Once you've figured out which situation applies to you, here's what you do: Rooted phones can simply download apps to help them back up their data. Unrooted phones, however, will need to enter the settings and privacy menus of their phone, check the boxes corresponding to what data they want to save, and then initiate a Gmail server backup. This, as the name implies, will save the data you select to Gmail's servers. Rooted or unrooted, the backup process is pretty easy, and allows for restoration of your important information, should the need arise.Say Cheese!: Backing up photos works somewhat differently than backing up SMSs or other data. You'll need to either import them to your PC or Mac via USB cable (and do it again every week or so, as new photos accumulate), or you can upload them to services like Flickr.Go Hands-Free: Look, good advice or not, people don't want another task injected into their already busy lives. Happily, for $5 USD, MyBackup Pro will save all your data (including photos) on their servers, and you can schedule automatic backups for the future, so you won't have to lift a finger.


What does group policy mean in computer language?

Group Policy is a feature of the Microsoft Windows NT family of operating systems. Group Policy is a set of rules which control the working environment of user accounts and computer accounts. Group Policy provides the centralized management and configuration of operating systems, applications and users' settings in an Active Directory environment. In other words, Group Policy in part controls what users can and can't do on a computer system. Although Group Policy is more often seen in use in enterprise environments, it is also common in schools, smaller businesses and other kinds of smaller organizations. Group Policy is often used to restrict certain actions that may pose potential security risks, for example: to block access to the Task Manager, restrict access to certain folders, disable the downloading of executable files and so on.OverviewGroup Policy can control a target object's registry, NTFS security, audit and security policy, software installation, logon- and logoff-scripts, Security filtering is the process of customizing the scope of the GPO by choosing which users and groups the GPO applies to.Windows Management Instrumentation (WMI) filtering is the process of customizing the scope of the GPO by choosing a WMI filter to apply.Delegation is the process of customizing the security descriptors of the GPO by assigning specific users and groups and the individual permissions that will be applied for each. This has more control than security filtering as it allows modification of both Apply and Deny permissions.[edit] GPO applicationThe Group Policy client operates on a "pull" model - every so often (a randomized delay of between 90 and 120 minutes, although this offset is configurable via Group Policy) it will collect the list of GPOs appropriate to the machine and logged on user (if any). The Group Policy client will then apply those GPOs which will thereafter affect the behavior of policy-enabled operating system components and applications.[edit] Local Group PolicyLocal Group Policy (LGP) is a more basic version of the Group Policy used by Active Directory. In versions of Windows before Windows Vista, LGP can configure the Group Policy for a single local computer, but unlike Active Directory Group Policy, can not make policies for individual users or groups. It also has many fewer options overall than Active Directory Group Policy. The specific-user limitation can be overcome by using the Registry Editor to make changes under the HKCU or HKU keys. LGP simply makes registry changes under the HKLM key, thus affecting all users. The same changes can be made under HKCU or HKU to only affect certain users. Microsoft has more information on using the Registry Editor to configure Group Policy available on TechNet.[1] LGP can be used on a computer on a domain, and it can be used on Windows XP Home Edition.Windows Vista supports Multiple Local Group Policy objects (MLGPO), which allows setting local Group Policy for individual users.[2][edit] SecurityOne potential problem with per-user policies is that they're only enforced voluntarily by the targeted applications. A malevolent user can interfere with the application so that it cannot successfully read its Group Policy settings thus enforcing potentially lower security defaults or even return arbitrary values.[citation needed] The user can also create a copy of the application at a writable location, then modify it such that it ignores the Group Policy settings.[citation needed][edit] See alsoGroup Policy improvements in Windows VistaAdministrative Templates[edit] References[3]^ Group Policy Settings Reference^ Step-by-Step Guide to Managing Multiple Local Group Policy Objects^ Remote installation without using Group Policy[edit] External linksMicrosoft Group Policy pagehttp://www.gpanswers.com/The Group Policy Management Console (GPMC)Step-by-Step Guide to Managing Multiple Local Group Policy ObjectsGroup Policy Settings (in Excel format) and registry key equivalents, from Microsoft[hide] v • d • e Windows componentsCore Aero · AutoRun · ClearType · Desktop Window Manager · DirectX · Explorer · Taskbar · Start menu · Shell (Shell extensions ·namespace · Special Folders · File associations) · Search (Saved search · IFilter) · Graphics Device Interface · Imaging Format · .NET Framework · Server Message Block · XML Paper Specification · Active Scripting (WSH · VBScript · JScript) · COM (OLE · OLE Automation · DCOM ·ActiveX · ActiveX Document · Structured storage · Transaction Server) · Previous Versions ·Win32 consoleManagementtools Backup and Restore Center · command.com ·cmd.exe · Control Panel (Applets) · Device Manager · Disk Cleanup · Disk Defragmenter · Driver Verifier · Event Viewer · Management Console ·Netsh · Problem Reports and Solutions · Sysprep · System Policy Editor · System Configuration · Task Manager · System File Checker · System Restore · WMI · Windows Installer · PowerShell · Windows Update · WAIK · WinSAT ·Windows Easy TransferApplications Calculator · Calendar · Character Map · Contacts · DVD Maker · Fax and Scan ·Internet Explorer · Journal · Mail · Magnifier · Media Center · Media Player · Meeting Space · Mobile Device Center · Mobility Center ·Movie Maker · Narrator · Notepad · Paint · Photo Gallery · Private Character Editor ·Remote Assistance · Windows Desktop Gadgets ·Snipping Tool · Sound Recorder · Speech Recognition · WordPadGames Chess Titans · FreeCell · Hearts · Hold 'Em · InkBall · Mahjong Titans · Minesweeper · Purble Place · Solitaire · Spider Solitaire · TinkerKernel Ntoskrnl.exe · hal.dll · System Idle Process · Svchost.exe · Registry · Windows service · Service Control Manager · DLL · EXE ·NTLDR / Boot Manager · Winlogon · Recovery Console · I/O · WinRE · WinPE · Kernel Patch ProtectionServices BITS · Task Scheduler · Wireless Zero Configuration · Shadow Copy · Error Reporting · Multimedia Class Scheduler · CLFSFile systems NTFS (Hard link · Junction point · Mount Point · Reparse point · Symbolic link · TxF · EFS) · FAT32·FAT16·FAT12 · exFAT ·CDFS · UDF · DFS · IFSServer Domains · Active Directory · DNS ·Group Policy · Roaming user profiles · Folder redirection · Distributed Transaction Coordinator ·MSMQ · Windows Media Services · Rights Management Services · IIS · Terminal Services · WSUS · Windows SharePoint Services · Network Access Protection · PWS · DFS Replication · Remote Differential Compression · Print Services for UNIX ·Remote Installation Services · Windows Deployment Services · System Resource Manager · Hyper-VArchitecture NT series architecture · Object Manager · Startup process (Vista) · I/O request packet · Kernel Transaction Manager · Logical Disk Manager · Security Accounts Manager · Windows Resource Protection · LSASS · CSRSS · SMSS ·MinWinSecurity User Account Control · BitLocker · Defender · Data Execution Prevention · Security Essentials · Protected Media Path · Mandatory Integrity Control · User Interface Privilege Isolation · Windows Firewall · Security CenterCompatibility Unix subsystem (Microsoft POSIX · Interix) · Virtual DOS machine · Windows on Windows ·WoW64 · Windows XP Mod


Is internet boon or curse?

With the evolution of the Internet, the life of a normal man in the towns changed from just a mere worker from a social person, an artificial social person, sometimes a natural social person. Internet changed many things, I am sure I need not speak much about it. But a special innovation which it brought about was the social networking.Basically social networking means a way in which one can keep himself connected to his near and dear ones in some way or the other. In the language of Internet, it is the same thing, but it is a similar thing conducted in a different way. Here, it is entirely a different thing. The natural social networking involves media like letter, mails, telegrams, phone calls, but today it includes media like SMSs, e-mails, scraps and what not, there are so many terms. I wanted to take this topic into consideration and after a long time, finally I got into a mood to discuss my thoughts with you all. So, I would discuss about the social networking related to Internet in the upcoming words.The Windward Side of ItSocial Networking, today, has made the life of the Richie riches easier. Those who have nice smart phones in their hands, can easily surf themselves right away.However, the medium classes can also enjoy this. People can today keep themselves connected to their near and dear ones all the times. They can easily correspond with them anytime they want to do. With offline messages like scraps and offline chat messages they can easily leave a message to their near and dear ones, asking about their welfare or having an informal chat of any type, anytime.Social networking has enabled us today to climb the mountains of connectivity so easily and you know, the best part of it? Most of the online services like chatting, emailing etc are totally free, so even the middle and the low classes can enjoy the services. It is therefore a big merit of this feature that cutting on the expenditure of ISD call rates, we can easily connect to the people of our beats easily, in case they are living in some other country. With the Internet social networking, one can easily present him/her before everyone. What does one need to do? Simply take a stand, spend some 3000-4000 bucks, create your own website, design it, put contents and finally you are done.In short, it therefore means that one can stay connected even while sleeping, and today to my surprise, marriages are being conducted with the help of the so called matrimony websites which help us find the guys of our taste and finally we can select the bridegroom or the bride, chat to him/her, have a meet with him/her and finally, the "Just Married" signboard will be on the back of the car. Thus, today, to my surprise, internet socialnetworking is helping people get married even. What not we can do? We can show our videos and songs.These were all the merits of social networking, these were simply the pros, not let's have a look towards the cones.The Leeward Side of ItToday so many people, especially the old aged people say that the new generation has become so lazy because of social networking feature. Many even say that these so called social networking media are simply making the people of the present generation unsocial by doing all these.It is notable that due to this feature of the internet, we are making friends with so many people whom we never see in our lives but we spend hours chatting with them without knowing who they actually are. Children of teenage who need to go to the fields and play with their real friends are busy with unidentified people on the net chatting with them, emailing with them, talking about their welfare and having a behavior in such a way that they are even more to them than their real friends. Yeah of course, some may come to a realistic end, but most of them really never meet. Children are becoming lazy talking to these people, maintaining their so called social status and just filling their life with dramatized follow ups. What are they doing? Students go to cyber cafes, spend hundreds of rupees and what they do? They simply keep on writing scraps to their so called distant friends. It really deviates the newbie minds from their actual courses, hitting at their health, hitting at their actual socialism.There are many leeward aspects, but what I want to question is that is this social networking grasping feature of the internet so social at all. Does it have more merits or more demerits. Anyways, my suggestion to the teenagers especially would be have a consideration on the so called social networked nature of theirs'.