1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Musya8 [376]
3 years ago
10

What is one disadvantage of accessing the Internet through a public search engine such as Google or Yahoo?

Computers and Technology
2 answers:
Naily [24]3 years ago
6 0
One disadvantage of accessing the Internet through a public search engine such as Yahoo, Google, or Bing, is that y<span>ou won’t be able to access documents that have not been published online. Some documents must be viewed in a local library or courthouse.</span>
iren2701 [21]3 years ago
5 0

Answer: b) You won't be able to access documents that have not been published online.

Explanation:  Public search engines are the used by the public for the searching and retrieving the information from the computer system.It is a helpful web-based service that provides the access to individual .Example-Google search engine etc.

Search engines tend to display the information that can be accessed through online mode.The information that is not present on web will not be accessible by any user.

Other option is incorrect because open service is a advantage of public search engine as it is available to everyone. Thus the disadvantage is option(b).

You might be interested in
2.<br> Fill in the blanks:<br> a) Software is a set of computer program
scoray [572]

Answer:

Software is a set of computer programs which makes computer work.

4 0
3 years ago
--- is a set of applications that manages the activities and resources of a computer.
hammer [34]
D. System Software 
is responsible for Manage activity 
4 0
3 years ago
What are somd negetive aspects and some positive aspects of having robots as a part of workplace?
aksik [14]

Answer and Explanation:

Some of the negative aspects of robots at work place:

  • Lesser flexibility
  • Higher maintenance and installation cost
  • Future insecurity and risk if the system malfunctions
  • A decline in the opportunities for humans
  • Unemployment as a result of automation and robot regulated work place.

Some of the positive aspects of robots at work place:

  • Higher accuracy
  • Higher speeds
  • More work in less time
  • Productivity and hence efficiency will increase
  • Cost of some operations is reduced.
  • Ease of employing in dangerous and hazardous fields by using specific robots for each task
5 0
2 years ago
Based on the chart below, which pie flavors make up approximately one-half of the total? A pie chart shows the following pie fla
Vladimir [108]
Based on the data, a combination of strawberry rhubarb (12%), chocolate mud pie (23%) and cherry (14%) would amount to 49% which is close to half of the pie chart or 50%. Another probable answer is the combination of coconut (9%), banana cream (10%), pumpkin (11%), and other (21%) which is equal to 51%.
8 0
3 years ago
Read 2 more answers
Why did utf 8 replace the sac character encoding standard
Sedaia [141]
UTF-8- is a variable width character encoding capable of encoding all 1,112,064 valid code points in Unicode using one to four 8-bit bytes. The encoding is defined by the Unicode standard. The sac character encoding method was addressed to simplify the symbolism of letter and symbols.As the computers grew in capacity UTF-8 method was implemented to optimize such protocol allowing more characters to be included with an expanded string of possibilities
7 0
3 years ago
Other questions:
  • A. True
    14·2 answers
  • A software license gives the owner the to use software.
    12·2 answers
  • In GIMP, the ( ) displays the image that the user is currently working on
    12·1 answer
  • Which of the following statement is true?
    5·1 answer
  • A _____ is a unique name that identifies an Internet site. URL Browser AOL IA
    13·1 answer
  • In which of the security mechanism does the file containing data of the users/user groups have inbuilt security?
    6·1 answer
  • ________ is the process the compiler uses to divide your source code into meaningful portions; the message means that the compil
    7·1 answer
  • Your organization has hired a penetration tester to validate the security of your environment. The penetration tester needs to d
    11·1 answer
  • Naseer has inserted an image into his document but needs the image to appear on its own line.
    8·1 answer
  • Which term refers to a shorthand method for identifying network and host bits in an ip address?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!