1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SCORPION-xisa [38]
4 years ago
5

What is the software that finds websites webpages images and other information called?

Computers and Technology
1 answer:
Vesna [10]4 years ago
6 0
Is it a search engine?
You might be interested in
Who you think is better? Ninja or TFue ,btw do you know who icebear is?
andrew11 [14]

Answer:

no, no i dont think i will.

Explanation:

4 0
3 years ago
The tools that cyber criminals often use, including computer viruses, worms, trojan horses and spyware, are called __________. q
ivanzaharov [21]
The options were: 

-malware
-spam
-Denial of Service
-Hacking 



The correct answer would be Malware. Here is why: Malware refers to a program or script that will affect a target device in a negative way, it cant be hacking because it is a topic, not a tool. Denial of Service is a type of attack that temporarily shuts down servers after a number of requests a device(s) make exceeds the number of requests it can take in a certain amount of time. Spam is either an advertising email from a third party company that bought your email from a list server from a service you gave your info to, like Facebook. Or spam could be a social engineering attack sent by someone trying to harvest your credentials from an email source your email server found untrustworthy.  

Please message me if you need any more help with this stuff, I am doing a lot of hacking projects right now and I think I would be a great contact!

Hope this helped!

3 0
4 years ago
What binary number is the output of adding 1001011 and 100000?
Ksenya-84 [330]
<span>01101011 is the answer.   Hope this helps 
its decimal is 107</span>
5 0
3 years ago
Describe the inter-relation and linkage in between traditional knowledge, indigenous knowledge and modern technology.​
xz_007 [3.2K]
Traditional knowledge is knowledgeable u know
5 0
3 years ago
In securing the client/server environment of an information system, a principal disadvantage of using a single level sign-on
podryga [215]

Answer:

C

Explanation:

7 0
3 years ago
Other questions:
  • In today's society, unethical actions are: A) Easier than ever to get away with, because the general public and insurers are les
    13·2 answers
  • Regional culture has been affected by technology in these ways. Select all that apply. decreased educational opportunities impro
    9·2 answers
  • Is printer an input device​
    5·1 answer
  • Though it is seen as a last resort bankruptcy allows a consumer to
    6·1 answer
  • Word processing software allows users to do which of the following:
    10·1 answer
  • Computer input is the process of translating physical signals (light, sound, movement) into which of the following?
    8·2 answers
  • 6) RAM, 5 main memory<br>which storage conbe used<br>as permanent storage<br>Rom<br>a) R<br>)​
    8·2 answers
  • import java.util.Scanner; public class ArraySum { public static void main(String[] args) { Scanner scnr = new Scanner(System.in)
    9·1 answer
  • Given the following code, assume the myStack object is a stack that can hold integers and that value is an int variable. Assume
    8·1 answer
  • Words that are restricted for use in object names because they belong to the SQL programming language are called _______________
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!