Search engines are programs that enable a user to search and find content under the category that a user is searching for and related results. A search engine receives a users input that is typed from a keyboard and then analyses the words typed in and searches through the database through related context/results. If the words typed in is recognizable, it will bring up Websites/URLS of sites that are related to the content.
A search engine is not to be confused with a browser. While a search engine finds websites/content, a browser is a application or program that is the interface used to host search engines using HTML. Although to some degree, they overlap, they do not always.
For example: Google and Yahoo are search engines that looks up input received by a user while examples of a browser will be Opera, Internet Explorer, and Firefox (Mozilla Firefox)
What Etna is trying to do by going to the file tab and the general section is to Create a new file with a set of parameters.
<h3>Steps to creating a new file.</h3>
In order to create a new file you have to do the following:
- You have to go to the file tab.
- Then you go to click options
- The next is the advanced category
- the checkbox is located in the general section.
Following all of the steps that are listed above would help Etna as she works on her project.
Read more on ways to create files here:
brainly.com/question/25554117
Answer:
gaming pc?
Explanation:
i dont know why you have this question kinda weird but entertainment pc or gaming pc sounds right
Answer: C. Confidentiality
Explanation: Confidentiality with regards to security simply means securing information belonging to certain individuals, group, entity or issues and information of national security or high level clearance by avoiding leakage to authorized persons or groups.
With regards to network structure, confidentiality encompasses safe keeping of network data structure, packet header, network protocols and other information relevant to network structure by preventing illegal or unauthorized access to such information through the use of firewalls and top level security systems.