1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksi-84 [34.3K]
2 years ago
5

Truncation is a keyword search technique that helps you find useful variations of a term or terms. You want to find books on the

topic of gravity and gravitational collapse. Where should you best truncate in this example?
Computers and Technology
1 answer:
sergiy2304 [10]2 years ago
4 0

Answer:

gravit* and collapse

Explanation:

Truncation is a keyword search technique that helps you find useful variations of a term or terms.

To find books on the topic of gravity and gravitational collapse, the best part to truncate is gravit* and collapse.

You might be interested in
In the world of computing,accessibility MOST often refers to what
Nutka1998 [239]

<span>Accessibility refers to access to some form of computer technology. This means that numbers are easily organized and data is easily calculated making it easier for people’s lives. It is a means of an efficient and more productive existence in the work environment.</span>

5 0
2 years ago
What is the advantage of using CSS?
zhannawk [14.2K]
Your answer would be B.) "It streamlines the HTML document."
8 0
3 years ago
Read 2 more answers
A PC is not able to connect to a wired network. Pinging the loopback address is successful, but the gateway cannot be reached. O
tangare [24]
Usually that means a physical connection - so either a loose or faulty ethernet cord.
5 0
2 years ago
What is the purpose of the SMTP command "HELO"
sergij07 [2.7K]
If a client initiates the SMTP communication using an EHLO (Extended Hello) command instead of the HELO command some additional SMTP commands are often available. They are often referred to as Extended SMTP (ESMTP) commands or SMTP service extensions. Every server can have its own set of extended SMTP commands.
4 0
3 years ago
How does Virus transfer from one computer to<br>another computer?​
Daniel [21]

Answer:

Viruses can enter your computer in any number of ways, such as via an email attachment, during file downloads from the Internet or even upon a visit to a contaminated Web site.Jun 2, 2010

Explanation:

Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software.

5 0
2 years ago
Other questions:
  • How do i start makeing a Character in the Unreal Game Engine
    14·2 answers
  • Type the correct answer in the box. Spell all words correctly.
    13·1 answer
  • Describe the concepts of Defense in Depth and Detection in Depth. Compare and contrast. What's different? What's similar?
    9·1 answer
  • What is the chief ethical concern concerning all the new sources of data available through new technological means like internet
    9·1 answer
  • A user deletes a message from a mailbox while on a desktop. What happens to the email message on the user's synchronized devices
    13·2 answers
  • Which of the following correctly describes the function of an IP address
    13·1 answer
  • Which of the following best describes the purpose of a design specification?
    14·2 answers
  • How do I answer a question that was answered incorrectly on Brainly
    10·2 answers
  • Which statements describe the use of styles in Word? Check all that apply.
    11·2 answers
  • Which tasks can be completed using the Chart Tools Design tab? Check all that apply.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!