1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr [31]
4 years ago
15

How have search engines like Google, Bing, and Yahoo! revolutionized the ability to do research? They are more difficult to acce

ss than the library. They provide only information from reliable sources. They provide immediate access to information on the web. They take longer than using a card catalog but provide only expert sources.
Computers and Technology
2 answers:
aev [14]4 years ago
3 0

Answer:

because it is easy to access not hard not all things from the internet are reliable they don't always have expert sources

Explanation:

Free_Kalibri [48]4 years ago
3 0

Search engines like Google, Bing, and Yahoo! have revolutionized research.

The best answer choice for this is that "they provide immediate access to information on the web".

The other choices would be wrong because...

Answer choice A, would be incorrect due to the fact that using the search engines makes it easier to access information than a library as you do not need to walk around the library looking for a book to provide you the answers to your question.

Answer choice B, would be false since the web doesn't always provide only reliable information from creditable sources. In fact, quite a few of the sources on the web that come up, are not helpful or do not assist the user in answering their questions.

Answer choice D, would be wrong since using the search engine to find information is quicker than using a card catalog, and also it does not only provide expert sources since any source of information could pop up when the user searches for it.

You might be interested in
1) Only analog signals can be used to transmit information.<br><br> a) True b) False
Contact [7]

Answer: False

Explanation:

Digital signal is used for transmission of information over a dedicated line wheres for using analog signal for transmission of information it is first converted to digital to be able to transfer it across long distances./

3 0
3 years ago
Informs the network interface card to pass packets sent to that address to the ip stack so their contents can be read, and tells
Lesechka [4]
The answer to this question is Registration
Registration on the network interface will allow computer users all around the world to access a certain information stored within a certain address in that network which most people know as a website.
Today, to do a network registration, people just need to contact a hosting service that will take care of everything for us, and we just need to provide the content.


6 0
3 years ago
Oday's color display devices represent color using the ______ color model.â
12345 [234]
Mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
3 0
3 years ago
a cisc-style instruction set has a large number of high-level instructions that perform highly complex operations in a single st
NikAS [45]

Both desktop and laptop computers employ CISC (complex instruction set computer) CPUs. Small programs are on CISC machines. It requires a lot of time to execute because it contains a great deal of compound instructions.

<h3>What do you mean by CISC?</h3>

Both desktop and laptop computers employ CISC (complex instruction set computer) CPUs. More complex instructions can be processed by this kind of CPU. For instance, a single instruction might load two values, add them, and then store the outcome back in memory.

A computer that, in contrast to a computer with a limited instruction set, allows individual instructions to perform numerous processes and need a large number of cycles to complete (RISC).

Small programs are on CISC machines. It requires a lot of time to execute because it contains a great deal of compound instructions. In this case, a single set of instructions is safeguarded in stages; each instruction set contains more than 300 distinct instructions. On average, instructions take two to ten machine cycles to complete.

To learn more about CISC refer to:

brainly.com/question/13266932

#SPJ4

8 0
2 years ago
What risks, threats, and vulnerabilities did you identify and assess that require immediate risk mitigation given the criticalit
olchik [2.2K]

Answer:

The risk and threat that need immediate mitigation are:

- random access to your personal computer without your permission

-  deletion of files and data

- hacking of IT infrastructure  

- uploading of file s on the social platform

- classified data can be used to blackmailing

Explanation:

Every country homeland security system work for the betterment of the citizen and thus their main concern is to provide threat and risk-free source of communication. But then also there are may serious threats that can come to one's privacy.

The risk and threat that need immediate mitigation are:

- random access to your personal computer without your permission

-  deletion of files and data

- hacking of IT infrastructure  

- uploading of file s on the social platform

- classified data can be used to blackmailing

6 0
4 years ago
Other questions:
  • The mutt software is an example of what type of mail service software on Linux? a. Mail Delivery Agent b. Mail Transport Agent c
    5·1 answer
  • before donating a computer you should use a program to wipe the hardest to remove all of his data true or false
    6·1 answer
  • What is the code range for the integumentary system subsection in the cpt coding manual?
    6·1 answer
  • In python:
    14·1 answer
  • Do you ever wonder what types of media you will be using five years from now or when you graduate from college or a training pro
    9·1 answer
  • What is 38 - -93 + 2 x 4.6?<br> and what’s 9,220 - -2.3 x U
    6·1 answer
  • Which printing options are available in the Print menu? Check all that apply.
    11·2 answers
  • Select the correct answer.
    6·1 answer
  • Which tag denotes the end of an element in HTML?
    8·1 answer
  • Explain the application software and utility software in detail​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!