1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Crazy boy [7]
3 years ago
10

You would like to search for information about storms but not tornadoes. What type of search strategy may be useful?

Computers and Technology
2 answers:
Helen [10]3 years ago
3 0

Answer:One of the most interesting comments regards 'stemming': "Some of the search engines offering wildcard search also support what is called "stemming." That means they will find terms like "singing" even if you only enter "sing." This also means you may not need to use a wildcard symbol."

Explanation:

kykrilka [37]3 years ago
3 0

Answer: ight your answer is searching for synonyms

Hope it helps :)

Explanation:

You might be interested in
What is added to brining liquid to add flavour​
AleksAgata [21]
Wet brining is a technique for seasoning meat by soaking it in a salt solution before cooking. As a general guideline, soak the meat in a solution containing 1 cup of salt per gallon of water. The salt will remain in the meat after cooking, imparting taste, and the liquid will be boiled away.

mark brainiest if helped.
5 0
2 years ago
The Windows Net use command is a quick way to discover any shared resources on a computer or server. True or False
V125BC [204]
Yes it’s true the window net use command is a quick way to discover any shared resources on a computer or server
8 0
2 years ago
Flowchart in programming
ArbitrLikvidat [17]

Answer:

?

Explanation:

7 0
2 years ago
Which careers have the highest minimum experience requirement?
Dafna11 [192]
(B) CIO, because they make $308,561 per year and it wouldn’t be A cause they only make $140,265 per year nor would C .
8 0
3 years ago
How can anger cause workplace accidents?
Umnica [9.8K]
I think the corect answer is c
8 0
3 years ago
Read 2 more answers
Other questions:
  • President Roosevelt's Fireside Chats were:
    12·2 answers
  • • In your response, please include some examples of the three different types of storage.
    11·2 answers
  • 2. An evil twin attack that broadcasts a legitimate SSID for an unauthorized network is an example of what category of threat? A
    9·1 answer
  • What are the differences, physically and logically, between the two printing configurations: Network-attached Printing and Netwo
    7·1 answer
  • The current standard for RFID is based off of Group of answer choices MIT standards IEEE standards ISO standards there is no agr
    12·1 answer
  • Okay, guys, I know this one will be very hard however while trying to finish this assignment I got overwhelmed and lost by the s
    9·1 answer
  • Desktop and personal computer are also known as​
    7·1 answer
  • Simple interest will always pay more interest than compound interest.
    14·1 answer
  • These 2 questions PLEASEEE (:
    14·1 answer
  • Ten ways ict has helped in social development
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!