1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Musya8 [376]
3 years ago
10

What is one disadvantage of accessing the Internet through a public search engine such as Google or Yahoo?

Computers and Technology
2 answers:
Naily [24]3 years ago
6 0
One disadvantage of accessing the Internet through a public search engine such as Yahoo, Google, or Bing, is that y<span>ou won’t be able to access documents that have not been published online. Some documents must be viewed in a local library or courthouse.</span>
iren2701 [21]3 years ago
5 0

Answer: b) You won't be able to access documents that have not been published online.

Explanation:  Public search engines are the used by the public for the searching and retrieving the information from the computer system.It is a helpful web-based service that provides the access to individual .Example-Google search engine etc.

Search engines tend to display the information that can be accessed through online mode.The information that is not present on web will not be accessible by any user.

Other option is incorrect because open service is a advantage of public search engine as it is available to everyone. Thus the disadvantage is option(b).

You might be interested in
Universal Containers wants line items to be organized into pre-defined groups on the output document. The name of these pre-defi
devlian [24]

Answer:

Set the Group field on the Line Items type of Template Content record.

Set the New Quote Group field on each Product record with the associated group name.

Explanation:

The two array that can be implemented are:

  • Set the Group field on the Line Items type of Template Content record.
  • Set the New Quote Group field on each Product record with the associated group name.
5 0
3 years ago
To use
sasho [114]

Answer:

Sticky notes

Explanation:

I got the question correct

7 0
3 years ago
Write a program with a car's miles/gallon and gas dollars/gallon (both floats) as input, and output the gas cost for 10 miles, 5
omeli [17]

Answer:

The Following are the code to this question:

def cost(miles, milesPerGallon, dollarsPerGallon):##defining a method cost that accepts three parameter

   return miles / milesPerGallon * dollarsPerGallon# calculate cost and return it value  

milesPerGallon = float(input('Enter miles/Gallon value: '))#defining variable milesPerGallon for user input  

dollarsPerGallon = float(input('Enter dollars/ Gallon value: '))#defining variable dollarsPerGallon for user input

print('{:.5f}'.format(cost(10, milesPerGallon, dollarsPerGallon)))#call method and print its value

print('{:.5f}'.format(cost(50, milesPerGallon, dollarsPerGallon)))#call method and print its value

print('{:.3f}'.format(cost(400, milesPerGallon, dollarsPerGallon)))#call method and print its value

Output:

Enter miles/Gallon value: 20.0

Enter dollars/ Gallon value: 3.1599

1.57995

7.89975

63.198

Explanation:

In the above-given code, a method "cost" is defined, that accepts three value "miles, milesPerGallon, and dollarsPerGallon" in its parameter, and use the return keyword for calculating and return its value.

In the next step, two variable "milesPerGallon, and dollarsPerGallon" is declared, that use the input method with float keyword for input floating-point value.

After input value, it uses a print method with different miles values, which are "10,50, and 400", and input value to pass in cost method to call and print its return value.

5 0
3 years ago
What is the first step in devising security services and mechanisms?
N76 [4]

Solution:

The first step in devising security services and mechanisms is to develop a security policy.

A security policy is a document that states in writing how a company plans to protect the company's physical and information technology (IT) assets. A security policy is often considered to be a "living document", meaning that the document is never finished, but is continuously updated as technology and employee requirements change. A company's security policy may include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company's assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy to ensure that necessary corrections will be made.

This is the required answer.

4 0
2 years ago
Read 2 more answers
A(n) guiiconfatmenu is a list of commands that tell your computer what to do.
natima [27]
Yes that is right a guiiconfatmenu is a list of commands that your computer will tell you to do
3 0
3 years ago
Read 2 more answers
Other questions:
  • Alexa hoped that a good outline will accomplish which of the following for her<br> presentation?
    12·2 answers
  • "a terminal has two input queues." as a user types each character to the terminal, it is collected in the ____ queue.
    5·1 answer
  • Catherine wants to search online for fruit juices. She is fine with aerated or fresh fruit juices. Which Boolean operator will e
    12·2 answers
  • The purpose of a lockout tagout checklist is to​
    9·2 answers
  • Which of the following can be considered beta testing? A programmer at Linus Systems checks the integration of multiple modules
    14·1 answer
  • IDE devices require the use of a controller mounted on the motherboard. True False
    14·2 answers
  • Define the function max2 that takes two integers as arguments and returns the largest of them. Then define the function max_list t
    11·1 answer
  • How much does a dodge tomohawk cost for a used one?
    7·1 answer
  • Describe an example of a very poorly implemented database that you've encountered (or read about) that illustrates the potential
    12·1 answer
  • Which of the following tabs on the Ribbon contains the commands for adding tables, pictures and shapes into a publication? Quest
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!