1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Misha Larkins [42]
3 years ago
8

What can search the internet and select elements based on important words

Computers and Technology
1 answer:
lesya [120]3 years ago
8 0
Search engines can search the internet and select elements based on important words
You might be interested in
URGENT!! Ronald wants to search for an image of a sports car. Ronald doesn’t have to remember the specific name of the image to
vaieri [72.5K]

Answer:

Ronald will use a search engine

Explanation:

Ronald will use a search engine to find an image of a sports car, like he would do to search information to help him with his homeworks.

He could use keywords to identify some features he wants to see in the picture.  For example "red sports car" or "Ferrari sports car".  The results might come from a general Web spider fetch job or from specialized sites in terms of stock photos for example.

Then, Ronald will be able to see many images matching its request... and choose the one most appropriate for his needs.

5 0
4 years ago
Which data type does not allow duplicate values-python
kkurt [141]

Answer:

Set

Explanation:

A set is unique in Python. It does not allow duplicates

6 0
2 years ago
What is a device that makes it possible for multiple customers to share one address is called a/n
chubhunter [2.5K]
I'm totally not sure but I think sec midterm flashcards
4 0
4 years ago
What are the five steps of ethical hacking?
Paraphin [41]

Answer

Explanation:

Hacking is simply gaining access into a computer through weaknesses that were found in the network system.

We have mainly 5 stages In ethical hacking which although must not be followed sequentially but could produce greater results if it was followed.

These stages includes

1. Reconnaissance

2. Scanning

3. Gaining access

4. Maintaining access

5. Covering tracks.

8 0
4 years ago
Type the correct answer in the box. Spell all words correctly.
Tom [10]

Answer:

navigate keys

Explanation:

the up and down keys are to scroll through documents and pages.

8 0
4 years ago
Read 2 more answers
Other questions:
  • Where should fire extinguishers be stored on a boat?
    7·1 answer
  • An airline company would like to easily locate lost luggage. What technology would make it easier for them to locate the luggage
    6·2 answers
  • If a secret key is to be used as a _________ for conventional encryption a single number must be generated.
    13·1 answer
  • Which statement about trees is false?
    12·1 answer
  • The endocrine system is composed of many parts of the body.<br> a)True<br> b)False
    11·2 answers
  • What is a row of data in a database called?<br> Field<br> File<br> Record<br> Title
    10·1 answer
  • What is good prossesser
    15·2 answers
  • Can somebody help me and make a code for this in PYTHON, please? I would be very thankful!
    10·1 answer
  • Mary is working on joining of a new domain tree to an existing forest, but before starting the process, she should have at least
    7·1 answer
  • What is the type of data in the list [103, 405, 527, 396, 503]?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!