1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
a_sh-v [17]
3 years ago
13

Is a program that finds web sites, web pages, images, videos, news, maps, and other information related to a specific topic?

Computers and Technology
1 answer:
Sloan [31]3 years ago
8 0
Probably Google, but if its not specific it would be search engines
You might be interested in
What effect does social media have on teens?
myrzilka [38]

Answer:

manipulation is the answer

3 0
2 years ago
Read 2 more answers
How do we add questions on sam Blockly?​
Blizzard [7]

Answer:

I do not know that answer

5 0
3 years ago
Which of the following best describes a server?
Lady_Fox [76]

Answer:

number 4

Explanation:

7 0
3 years ago
Read 2 more answers
The development team recently moved a new application into production for the accounting department. After this occurred, the Ch
Gnesinka [82]

Answer:

B

Explanation:

User Acceptance Testing (UAT) is the testing done by end users who is going to use that application. In these testing they will test  whether the application meets all the functional requirements of the end user. If it passed then only the application will move to the production. This will ensure that the application meets the user requirements before it put into the usage.

The Answer is B

5 0
3 years ago
A polyalphabetic cipher uses many ___
Greeley [361]

Answer:d) Mono-alphabetic substitution rules

Explanation: Poly-alphabetic cipher is the cryptography that is done by using the many alphabets in substitutional way. They are supposed to have a good security because they use cipher text alphabets for the encryption and then decrypts it.

Substitution of the alphabets is done by the rule of the mono-alphabetic substitution rules.Other given options are incorrect because they are not used in the cryptography of the alphabetic cipher. Thus option (d) is the correct answer.

3 0
2 years ago
Other questions:
  • what has become an established maritime commerce Center and one of the largest cities in the United states ​
    11·1 answer
  • Remember to save _____ and be certain that you have your files saved before closing out.
    11·1 answer
  • "You are on a service call to fix a customer’s printer when she asks you to install a software package. The software is on a per
    13·1 answer
  • #We've started a recursive function below called #measure_string that should take in one string parameter, #myStr, and returns i
    5·1 answer
  • How many bytes are in 1 kilobyte of storage
    13·1 answer
  • The function of the file server is to : 1. store data and software programs that can be used by client computers on the network.
    12·1 answer
  • Match each sentence to the type of imperialism it describes.
    11·1 answer
  • Which two components in a system might make a loud whining noise when there is a problem? Why?
    14·1 answer
  • List any two different between primary memory and secondary memory.​
    8·2 answers
  • A laptop computer manufacturer would consider the computer's processor chip to be a(n) ______ cost.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!