1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
irina1246 [14]
2 years ago
8

elements that have little or no effect on search results include . select all that apply. a. keywords b. stop words c. search op

erators d. capital letters
Computers and Technology
1 answer:
myrzilka [38]2 years ago
6 0

Elements that have little or no effect on search results include:

b. stop words.

d. capital letters.

<h3>What is a binary search?</h3>

Binary search can be defined as an efficient algorithm that is designed and developed for searching an element (information) from a sorted list of data that are stored on a database, especially by using the run-time complexity of Ο(log n)

<u>Note:</u> n is the total number of elements in a list.

In Computer technology, elements that have little or no effect on search results include he following:

  • Stop words.
  • Capital letters.

However, keywords and search operators are important elements that have a significant effect on search results.

Read more on binary search here: brainly.com/question/24268720

#SPJ1

You might be interested in
Which best explains a password attached to a document
Dmitrij [34]
What document dbdsvhcznbdfhdsc
6 0
3 years ago
Which of these are the two main components of a CPU?
Mrrafil [7]

Answer:

Control unit and Arthemitic logic unit

plz mark me as brainlist

7 0
3 years ago
Read 2 more answers
Chandra, a student working on a group project, is trying to decide how to have the whole group suggest revisions for an essay. S
fenix001 [56]
I believe the appropriate answer would be comments
7 0
3 years ago
The IT department in a company is looking for a solution to consolidate the functionality of several mission critical server com
marshall27 [118]

Answer: (1) Oracle VM Server  

               (2) VM Ware v Sphere

Explanation:

  The oracle VM server and the VM ware v Sphere are the two hyper-visors that is used in the IT department by an organization for the purpose of high performance.

  • The oracle VM (Virtual machine) server is one of the type of virtual machine that is used to run various types of operating system and oracle VM server is one of the open source technology that support Linux and window.
  • The VM ware V sphere is one of the type of visualization based application which basically run the multiple OS based system by using the single machine. It is also helps in balancing the workload in the system.  

According to the given question, the two given hyper-visors are used by the information technology department that helps in handling the critical functionality in an organization.

 Therefore, The given answer s correct.

8 0
4 years ago
Which of the following is part of the cycle of dating violence
katen-ka-za [31]

Dating violence is a pattern of behavior where one person threatens or actually use

Physical, sexual, emotional, or verbal abuse to control his or her dating partner.

Examples of physical abuse are

Hitting, shoving, kicking

Examples of sexual abuse are

touches you when you don't want them to, forces you to watch dirty things,  

intercourse, fondling, exhibitionism, voyeurism, exploitation, prostitution & exposure to body parts.

Examples of verbal and emotional abuse

Insults, belittling, name calling, blaming, humiliation & false accusations.

Abuse is a

The deliberate infliction of harm or the threat of harm to a vulnerable person

Abusers in teen dating relationships, use behaviors of

Fear and intimidation

The only person that can choose to stop the violence is the

Abused.

Signs of an abused teen

Do poorly in school, have low self-esteem, may cry frequently, & may have trouble learning.

Abused teens even contemplate or attempt

Suicide

1 in 11 teens report being victims

Physical dating violence each year.

6 0
4 years ago
Other questions:
  • "the firewall acts as a proxy for which two types of traffic? (choose two.)"
    14·1 answer
  • At the top level of a tree is a single node called the ________ a)pinnacle b) root c) top d)front
    12·1 answer
  • Osha requires employers pay for most required personal protective equipment including
    11·1 answer
  • If you filmed a clip in 120fps, how many frames are in a seconds of video.
    13·1 answer
  • There are six different sequences for the three approval tasks: check inventory; check credit; check special terms.
    5·1 answer
  • Describe the basic features of the relational data model and discuss their importance to the end user and the designer. Describe
    9·1 answer
  • What is the location in the base interface of the link to
    7·1 answer
  • Who plays rocket league on xbox?
    15·2 answers
  • Select the correct answer from each drop-down menu.
    5·2 answers
  • Many universities form tight-knit alumni networks, causing the alumni to continue to use each other as a resource for career pla
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!