1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
GenaCL600 [577]
3 years ago
11

What are three procedures used by browsers

Computers and Technology
2 answers:
ra1l [238]3 years ago
5 0
I believe that the three procedures are...

1.  Sub - Standard sub routine

2.  Function - a routine that returns an answer

3.  Property - reserved for <span> Class Modules</span>

<span>Hope this helps, please mark brainliest!</span>

Anna007 [38]3 years ago
5 0

Answer:

crawling, indexing, and searching

Explanation:

it says yes

can i get the  brainliest?

You might be interested in
The natural functions of Earth seem all _____ in one way or another.
Sonja [21]
Would it be Similar ?
4 0
3 years ago
Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trai
BlackZzzverrR [31]

Answer: Source

Explanation: The malware is the software persisting malicious approach to cause the damage/loss.The primary trait of the malware are infection,concealment,etc.

The concealment refer to the malware such as the Trojan horse, and other viruses that has only purpose to cause the malfunctioning in the system.The virus that get into the other software and then damage the system in known as the infectious malware .

The circulation is the transferring of the virus in the circular manner between the system for the damaging.Thus,the only trait that is not the part of the malware is source.

4 0
3 years ago
Which of these is not used by analysts when adopting CASE tools? (1 point) (Points : 1.5) communicating more effectively with us
mojhsa [17]

Answer: expediting the local area network

Explanation: Case tools are the tools or service that helps in the software development but the automatic activity. This tool can be applied on various applications like mobile apps, E-commerce websites etc.

Analyst focus on the features like improving productivity ,low time consumption,integration of the work and making the communication better with the users ,helps in producing large amount of the documents etc.

The only factor not accepted by analyst is accomplishing the operation in the LAN(local area network) as it does not facilitates this operation because it is not software development process.

4 0
3 years ago
What is mean by cgi?
kifflom [539]

Answer:

CGI stands for common gateway interface. It is used in transferred information between world wide to the CGI program. As CGI program is the programming language which can be written in java , C and perl. It is a web server dynamically used with users. CGI is a standard used to create web pages by web servers.

4 0
3 years ago
The line of code after a line beginning with the word 'else' needs to begin with a(n) ___.
Julli [10]
The answer to your question is D
7 0
1 year ago
Other questions:
  • Software license infringement is also often called software __________.
    11·2 answers
  • How is a computer component, such as a network card, commonly marked for identification?
    12·1 answer
  • You can use RWA to demonstrate how to do something special on the web, such as displaying articles found on websites that suppor
    15·1 answer
  • Does anyone know the point of gradpoint?
    8·1 answer
  • Write a program that prompts the user to enter the month and year and displays the number of days in the month. For example, if
    13·1 answer
  • A _______ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to hea
    9·2 answers
  • Which small-group format would be most appropriate for the following situation? A large sporting event is coming to town. Key me
    14·2 answers
  • Match the items with their respective descriptions.
    6·2 answers
  • You can use the ____ command to delete an entire table and its data.?
    6·1 answer
  • When creating any digital work, what is the MOST important thing to remember?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!