1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
larisa86 [58]
3 years ago
6

Search boxes are used to

Computers and Technology
1 answer:
soldi70 [24.7K]3 years ago
6 0
My guess would be D.
You might be interested in
There u go i did thereeeeeeeeeeeeeeeeeeeeeee
Alika [10]
Awwww u cutie pie:)) thanks for showing me how to screenshot
3 0
3 years ago
Read 2 more answers
Please explain why an operating system makes a great attack target.​
BartSMP [9]
The operating system is the fundamental controller of all system resources
Operating system popularity is one major reason why hackers attack
Window is a big target because it powers the vast majority of the world’s desktop computers and laptops.
To steal personal and protected health information
To steal user credit card numbers and other financial data
To harm the system or disrupt business operations of any organization
To gain competitive edge over opponents
To spoil the reputation of an organization

If you want answer to question 19, put a Thanks and comment that you want answer to question 19
8 0
3 years ago
I’m joining the robotics team in my school, but my knowledge is pretty basic. What should I do to improve myself?
Aleonysh [2.5K]
Start learning the functions of a computer and really put ur heart into it
8 0
3 years ago
The following system is ideal for representing large, sparsely-populated tables that have a need for real-time, read-write rando
SVETLANKA909090 [29]

Answer:

The correct answer is C. HBase.

Explanation:

HBase is a database system written in the Java programming language. It is open-source and can store enormous amounts of data in tables in billions of rows and columns. It enables random read and write operations in real time. In HBase, the query fetch time is less. It is designed to store denormalized data in wide and sparsely populated tables in contrast to the relational database management system.

4 0
4 years ago
You will locate a presentation online that focuses on your field (for example you might choose a TED talk focused on your field)
Bogdan [553]

Answer:

presentation: "How to stop screwing yourself over" A ted talk by  Mel, an American television host. She constructively used  presentation skills such as clear verbal communication, humor, story telling  and of course, good preparation and research to present in the video, the video has more than 22 million views.

Explanation:

verbal communication: She communicated in a clear and concise language to pass her message across to the audience. This  is a vital skill for a good presentation.

Humor: She was able to use humor to lighting the presetation atmosphere without derailing from the main point. Effective use of humor will increase audience attention during the presentation.

story telling: Everybody loves story, when stories that are related to the main point of the presentation are shared, it will instill the main of point of the presentation in the mind of the audience.

Good preparation and research: Adequate preparation is key to the success of any presentation. It allows the speaker to understand his or her audience before the actual presentation as well as get all need resources for the presentation.

8 0
4 years ago
Other questions:
  • How does consumption of alcohol affect your driving skills? Name three ways that alcohol can affect your driving.
    15·2 answers
  • Which option can Jesse use to customize her company’s logo, name, address, and similar details in all her business documents?
    7·1 answer
  • Common types of possessed objects are smart cards, rfid-encoded badges, magnetic cards, ____, and smartphones that are swiped th
    7·1 answer
  • Is GLaDOS from portal 2 possible?
    14·1 answer
  • Technology experts in the area of _____ specialize in technology for competitive advantage. a. process design b. hardware strate
    13·1 answer
  • 1. (1 pt) Suppose you wish to run a program P with 37.5 x 109instructions on a 15 GHz machine with a CPI of 0.75. What is the ex
    9·1 answer
  • What is the purpose of the GETPIVOTDATA function?
    13·2 answers
  • 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
    6·1 answer
  • Give four example of computer virus​
    13·1 answer
  • Question 1 of 1
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!