1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sati [7]
3 years ago
6

Which of the following is NOT a search engine ( Bing, Yahoo, Ask, Twitter)

Computers and Technology
2 answers:
trapecia [35]3 years ago
5 0
Twitter because it is a social media app
ohaa [14]3 years ago
5 0
Twitter(as far as my knowledge about it) is NOT a search engine. Bing, Yahoo, and Ask are used to search the web. Twitter is a social media platform people use to keep others informed about their life.
You might be interested in
Which of the following is a way to prevent wastes from contaminating the environment? A) Use absorbent pads to collect floor was
Firlakuza [10]

Answer

Dispose of absorbents as hazardous waste in its own hazardous waste container

Explanation

Hazardous waste is a waste that has chemical composition and properties which makes it capable of causing illness, death  or harm to humans and other life forms when released to the environment without proper management. The characteristics of such wastes include: toxic, ecotoxic, infectious substance, poisonous, explosive and flammability. Hazardous wastes can be destroyed by incineration, chemical process, and temporary on-site waste storage facilities such as waste piles and lagoons/ponds



8 0
4 years ago
Read 2 more answers
Write a recursive method called printNumPattern() to output the following number pattern. Given a positive integer as input (Ex:
TiliK225 [7]

Answer:

See Explanation Below

Explanation:

// C++ printNumPattern() recursive method

// Comments are used for explanatory purpose

// Only the recursive is submitted

// Method starts here

void printPattern(int num1, int num2, bool dec)  

{  

// Print num2.  

cout << num2 << " ";  

//Printing to num1

if (dec == false && num1 ==num2)  {

 return;  }

// Printing to 0 or negative.  

if (dec)  

{  

// If num2 is greater than num2

if (num2-num1 > 0)  

 printPattern(num1, num2-num1, true);  

else // recur with false dec  

 printPattern(num1, num2-num1, false);  

}  

else // If dec is false.  

 printPattern(num1, num2+num1, false);  

}  

//End of recursive

7 0
4 years ago
3.What is the difference between SODIMM and UniDIMM?
lorasvet [3.4K]

Answer:

Small Outline Dual Inline Memory Module and Unbuffered Dual Inline Memory Module are two terms that describe types of computer memory. While UDIMM is a generic term that applies to most memory modules, SO-DIMM modules are used almost exclusively in notebook computers

Explanation:

6 0
4 years ago
How do you move a slide to another location in you your<br> presentation?
ludmilkaskok [199]

Answer: Literally click on it and hold, then just drag it to wherever you want it

Explanation: Hope this helped you

5 0
3 years ago
Feistel proposed that we can approximate the ideal block cipher by utilizing the concept of a __________ cipher, which is the ex
sweet-ann [11.9K]

Answer:

product cipher Is the answer

5 0
2 years ago
Read 2 more answers
Other questions:
  • Which building-block feature is available in the Text grouping on the Insert tab?
    14·1 answer
  • Assume s is a string of lower case characters.
    15·1 answer
  • In 2–4 sentences, describe how you would center text.
    11·1 answer
  • "When an interrupt or a system call transfers control to the operating system, a kernel stack area separate from the stack of th
    11·1 answer
  • Create a network for a company that sells shoes. Describe the hardware needed and the size of the network (PAN, LAN, WAN) and ma
    6·1 answer
  • Bill is building a project network that involves testing a prototype. he must design the prototype (activity 1), build the proto
    5·1 answer
  • Write two statements to read in values for my_city followed by my_state. Do not provide a prompt. Assign log_entry with current_
    13·1 answer
  • How do i fix a name split in python
    8·1 answer
  • What do you understand by storage devices ? Name any two storage devices.​
    11·2 answers
  • It is important to understand the different types of DoS attacks and the symptoms of those attacks. Leaving a connection half op
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!