1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WITCHER [35]
3 years ago
9

Most queries have fully meets results

Computers and Technology
1 answer:
liq [111]3 years ago
8 0
True. Most queries have fully meets results, those queries who have completely satisfied the user's standards of queries. For example if a user searches for something in a website then the website which the user's is on makes super fast process and satisfies the user.
You might be interested in
If a = 3 and b = a+3 find value of b.
ASHA 777 [7]

Answer:

you need to place the value of a when in the b eqution has an a like :

Explanation:

b = 3+3

b=6

8 0
3 years ago
Read 2 more answers
There are main type of memory
BARSIC [14]

Answer:

Random acess memory (RAM)

Explanation:

8 0
3 years ago
Meaning of page break​
zmey [24]

Answer:

a point at which a price of continuous text is split into two pages

Explanation:

for ex: a page break is treated as a single character in the document.

6 0
3 years ago
Why is network security important? Check all of the boxes that apply. A. Network security allows organizations to continue to fu
serious [3.7K]

Answer:

A. Network security allows organizations to continue to function.

C. Network security keeps intruders out of the network.

D. Network security prevents personal information from getting into the wrong hands.

Explanation:

Network security is a very important concept in networking. Mitigating cyber attacks like key logging, malicious software attacks, reconnaissance attacks, DOS attacks etc, have saved so many companies from bankruptcy and death.

Security in networks helps to prevent attackers from obtaining user personal information like Bank detail, health history etc.

5 0
3 years ago
A new PKI is being built at a company, but the network administrator has concerns about spikes of traffic occurring twice a day
kipiarov [429]

Answer:

Option A (CRL) is the right answer.

Explanation:

  • Certificates with respective expiration date canceled mostly by CA generating or providing them, then it would no longer be tolerated, is considered as CRL.
  • CRL verification could be more profitable for a platform that routinely manages several clients, all having pronouncements from a certain CA, because its CRL could be retrieved once per day.

Other given choices are not connected to the given scenario. So Option A is the right one.

7 0
3 years ago
Other questions:
  • ___ refers to all aspects of managing and processing information using computers and computer networks
    13·1 answer
  • What command would you use to make a secure shell connection to the ubuntu client machine? ()?
    9·1 answer
  • Data bars describe a graphic element that
    7·1 answer
  • What are the names of each devices pleaseee​
    13·2 answers
  • To activate a wizard to help in creating combo boxes and command buttons, make sure the ____ button is selected
    6·1 answer
  • Write a python program to print the square of all numbers from 0 to 10.
    15·1 answer
  • 1. Explain the difference between a web browser and a search engine. (2 points)
    8·1 answer
  • State four reasons why office automation is adopted in business establishment?​
    7·1 answer
  • Reality and computer-generated simulations can solve a lot of problems
    14·1 answer
  • Discusse five advantages of utilising DBMS over a file based system
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!