1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina1246 [14]
2 years ago
8

elements that have little or no effect on search results include . select all that apply. a. keywords b. stop words c. search op

erators d. capital letters
Computers and Technology
1 answer:
myrzilka [38]2 years ago
6 0

Elements that have little or no effect on search results include:

b. stop words.

d. capital letters.

<h3>What is a binary search?</h3>

Binary search can be defined as an efficient algorithm that is designed and developed for searching an element (information) from a sorted list of data that are stored on a database, especially by using the run-time complexity of Ο(log n)

<u>Note:</u> n is the total number of elements in a list.

In Computer technology, elements that have little or no effect on search results include he following:

  • Stop words.
  • Capital letters.

However, keywords and search operators are important elements that have a significant effect on search results.

Read more on binary search here: brainly.com/question/24268720

#SPJ1

You might be interested in
What is the purpose of the Arrange All command?
ladessa [460]

Answer:

allows you to see multiple workbooks at once

Explanation:

I got it right on edge 2020

8 0
3 years ago
Read 2 more answers
What is File Allocation Table
vichka [17]
It's how you format your hard drive
4 0
3 years ago
Read 2 more answers
Network firewall entry and exit points are called
LuckyWell [14K]
___the answer is ports
6 0
4 years ago
What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a
babymother [125]

Answer:

Brute-force attack

Explanation:

A Brute-force attack is an attack that uses repetitive attempts of trying different combinations of usernames and passwords to access a website or server, The attacker can even use bots to help with the attack. This is the first line of attack used by hackers to gain unauthorized access to any password-protected server or website.

6 0
4 years ago
As a student you are able to earn extra money by assisting your neighbors
Lorico [155]
You can just earn extra money by doing your neibors lawn
8 0
3 years ago
Read 2 more answers
Other questions:
  • Industrial Products is a small light-manufacturing firm that produces a variety of control systems for heavy industry. It has a
    13·1 answer
  • What is the best anime that you like the most (give me 3 plz)
    7·2 answers
  • How to see if your computer has bluetooth?
    6·1 answer
  • after installing a second hard drive what needs to be done to the hard drive and what do these 2 tasks do?
    13·1 answer
  • Who do u play as in sister location
    14·2 answers
  • Discuss the types of data that business might collect and how the business could use that data to drive decision-making in a spe
    15·1 answer
  • While recording a voice, if the narration is large,it is better to make a :a)a linked object b)an embedded object c)none d)does
    14·1 answer
  • 1. Felipe looks over his presentation, and he notices that some of his words are written in bold and some are written in italic.
    7·1 answer
  • Because all the IEEE WLAN features are isolated in the PHY and ____________ layers, practically any LAN application will run on
    11·1 answer
  • Need help with this, will give brainliest
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!