1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
frozen [14]
4 years ago
7

A search engine is aprogram to search......​

Computers and Technology
1 answer:
coldgirl [10]4 years ago
4 0
Yes it is. Why are you asking?
You might be interested in
The most frequently applied heuristic in problem solving is a(an) _________, which involves repeated tests for differences betwe
Dvinal [7]

Answer:

means-ends analysis

Explanation:

<h2><u>Fill in the blanks</u></h2>

The most frequently applied heuristic in problem solving is a <u>means-end analysis,</u>  which involves repeated tests for differences between the desired outcome and what currently exists.

8 0
4 years ago
How to enter date in a Date/Time field?​
NikAS [45]

Answer:

Right-click the document tab for the new table and click Design View. In the Field Name column, select the first blank row, and then type a name for the field. Select the adjacent cell in the Data Type column, and then select Date/Time or Date/Time Extended from the list. Save your changes.

Explanation:

3 0
3 years ago
When replacing a system board in a laptop, which feature is a must?
Sphinxa [80]
I would use a dual core Becuase a quad can be too space consuming and it can overheat the computers software
6 0
3 years ago
Answer 1 question and get 10 points in return
AlekseyPX

Answer:

3

Explanation:

sorry if I'm wrong...it's been a while since I took a coding class.

5 0
3 years ago
Read 2 more answers
Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
natulia [17]

Answer: Geotagging was enabled on her smartphone

Explanation:

The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.

Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.

In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.

8 0
3 years ago
Other questions:
  • You would like to create a graph that shows how much of your total investments are in stocks, savings, and mutual funds. You sho
    5·2 answers
  • Which feature of a browser will you select to block pop-ups? view help tools file
    15·2 answers
  • How does soil lose its value? A.When the top soil is stripped by wind or water B.When the bedrock is damaged by animals C.When w
    15·1 answer
  • How to get the home button on your screen?
    13·1 answer
  • Describe a hybird electrical vehical
    12·1 answer
  • Jerry is working at the desk of a client in the marketing department of his company. The client thinks that the problem is the v
    5·1 answer
  • Use the _______ command to center worksheets vertically and/or horizontally on a page.
    9·1 answer
  • Use a for/else loop to traverse through the key names in the dictionary below in order to find Mr. Potatohead’s mailing address.
    7·1 answer
  • In this progress report, you will be focusing on allowing one of the four transactions listed below to be completed by the user
    14·1 answer
  • How do you delete questions you asked?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!