1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirza4 [7]
3 years ago
7

Which of the following is NOT true about Parvati's web search? Group of answer choices a) She will enter the desired search text

in the Query box. b) The more descriptive the search text, the easier it will be to locate the desired search results. d) The search engine may provide search text suggestions as she types. e) To display the website of the search result, click it in the list.
Computers and Technology
1 answer:
shepuryov [24]3 years ago
3 0

Answer:

The answer is letter A

Explanation:

<em>She will enter the desired search text in the query box. This statement is NOT TRUE</em>

You might be interested in
When authenticating a user's password, the password supplied by the user is authenticated by comparing the ____ of the password
Bas_tet [7]

Answer:

Hash.

Explanation:

An authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification. Smart cards, digital certificates, picture passwords, and biometrics are generally used to perform an authentication in the field of computer.

Hence, when authenticating a user's password, the password supplied by the user is authenticated by comparing the hash of the password with the one stored on the system.

In Computer science, a hash function can be defined as any function which is used to map data by accepting a block of data with variable length size or arbitrary size as input to produce a fixed size hash values or codes.

Generally, when a block of data (input) of arbitrary size is hashed, the resulting hash values or codes is usually smaller than the input data. Thus, hash functions are considered to be a compression of data and as a result, sometimes called compression functions. Basically, the block size of a hash function typically ranges from 128 bits to 512 bits.

5 0
2 years ago
Since the value we want to receive is either true or false, it makes the most sense to use:
EastWind [94]

Answer:

Logical Expressions

Explanation:

The expressions  that have logical statements which could be "true or false" are known as logical expressions. These types of expressions are also known as Boolean Expressions.

These expression are used in computer programming. The purpose of these expressions in programming is to make a decision that could be based on different conditions. These conditions could be true or false. This is the main reason that. logical expression makes best sense for values received in true or false.

8 0
3 years ago
I need help please?!!!!
mrs_skeptik [129]
It would be wear a seatbelt
6 0
3 years ago
Read 2 more answers
Derek has an interest in designing video games. What requirements should he fulfill to be a game designer? To be a game designer
4vir4ik [10]

Answer:

2. Marketing, communication or advertising

Explanation:

5 0
3 years ago
Consider the following scenario and prescribe a solution. Situation: Tenisha is moving to Ohio to attend college. It is very hum
xz_007 [3.2K]

Answer:

Unplug the computer during a lightning storm

Explanation:

If there is a lightning storm you should always unplug your laptop or laptop or computer. If the lightning hits your computer you fried it and you can't use it anymore, but, if you unplug it it will save it from getting it fried. Always unplug your your computer during a lightning storm!

Hope it helps! :D

Have a great day! :)

3 0
3 years ago
Other questions:
  • "under the control panel, what console contains print management, computer management, and event viewer?"
    11·1 answer
  • (Palindrome integer) Write the methods with the following headers // Return the reversal of an integer, i.e., reverse(456) retur
    9·1 answer
  • An application ________ is anyone who writes a computer application for one or more platforms.
    5·1 answer
  • Why, y did brainly just do that........or did it just happen to me
    12·2 answers
  • What is the FaFASA4caster used for
    10·1 answer
  • Identify the following​
    9·1 answer
  • Que es tarjeta madre resumen porfa
    13·2 answers
  • Suppose you are working as an administrative assistant at a small law firm. Your boss has asked you to send an invitation out to
    5·1 answer
  • Which of the following statements is TRUE of a peer-to-peer network?
    10·1 answer
  • How to use 2 tabs at once on my Lenovo yoga book?​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!