1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Luda [366]
3 years ago
10

What is a Boolean operator?

Computers and Technology
1 answer:
ASHA 777 [7]3 years ago
8 0

Answer:

The correct answer is search parameters set to identify specific information during Internet searches.

Explanation:

A Boolean operator is used to connect words or symbols that allows setting search parameters to include or exclude items in a text search.  

The booleans operators are:

  • AND.
  • OR.
  • NOT.
You might be interested in
What is the target audience for this poster?
bija089 [108]

Answer:

there is no car on a bus a bus is one long vehicle

Explanation:

7 0
3 years ago
Read 2 more answers
A=3<br> b = 2<br> print (a ** b)<br> What is output?
Lady bird [3.3K]

Answer: ( 3**2)

Explanation: honestly I can't help you. Try google it is waiting for you with open harms.  

6 0
3 years ago
Read 2 more answers
What is the best java 3d modeler library?
LenaWriter [7]
I believe its "Thinking Universe"
5 0
4 years ago
Give two reasons why cloud computing could be detrimental to a company.
dimulka [17.4K]

Security/Insider threats.

As much as cloud computing is good for your organization, just know that someone is looking after your data. The cloud provider does everything for you from maintenance to managing security. The bigger picture here is that users are entrusting their data to someone else. Although the work of cloud providers is to ensure that your data is safe, some are not always looking after your best interests.

Cyber-attacks.

Any time your data is stored on the cloud, you are at a higher risk of cyber-attack. Vulnerabilities such as DDoS attacks might occur and this single point of failure is in the cloud. As cloud computing continues to become more sophisticated, so do cyberattacks. As much as the security is right, hackers will go to any lengths to penetrate the systems.  


3 0
3 years ago
When an interviewer asks “Tell me about yourself”, you should tell them about your childhood past.
Butoxors [25]

Answer: Nooo! Dont!

Explanation:That is a bad idea!

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is not a network connection LAN WAN SAN MAN
    6·1 answer
  • Provide Java code to illustrate how to create an array, reference an array, and address an element of an array.
    13·1 answer
  • With dhcp, a device borrows, or ____ an ip address while it is attached to the network.
    6·1 answer
  • If you need assistance with your I-20 which phone number at UC would you call?
    10·1 answer
  • A user is attempting to format a 4 TB HDD using NTFS but only has the option to format the disk with a size of approximately 2 T
    15·1 answer
  • A 'array palindrome' is an array which, when its elements are reversed, remains the same (i.e., the elements of the array are sa
    6·1 answer
  • What are the two types of computer keyboards and how are they different?
    6·2 answers
  • A CPU has 32 KB cache, 2-way set associative, 16-byte block size. How many bits are required to use index each set in this cache
    6·1 answer
  • For enterprise servers, or servers accessed around the clock, SATA disks are preferred over SAS disks. True or False
    12·1 answer
  • Full form of http.<br>wrong answer will be reported ​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!