1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nesterboy [21]
3 years ago
10

What can search the internet and select elements based on important words

Computers and Technology
1 answer:
sattari [20]3 years ago
4 0

Como ser responsable
Ser cuidadoso
Dejar de fumar

You might be interested in
Why would you set up a workbook to be shared if you are the only one using the workbook?
goldfiish [28.3K]

Answer:

b. You can track changes.

Explanation:

Setting up a workbook to be shared if you are the only one using the workbook is to enable you track the changes that may occur.

When sharing a workbook, you can allow users gain access to it, make changes and then you easily track those changes.

It makes a team to work simultaneously on the same workbook.

5 0
3 years ago
Will mark Brainliest, need help ASAP!
Whitepunk [10]

Answer:

What Sherman needs to configure is:

RIPv2 class D of 240.

Explanation:

Multicast messages are usually dispatched to a select group of hosts on a network and require acknowledgement of the recipients. RIPv2 is a router-based internet protocol for exchanging routing information to the IP address 224.0. 0.9 on a network. It determine the most efficient way to route data on a network and to prevent routing loops.

3 0
2 years ago
In this problem, we explore some of the properties of the CRC. For the generator G (=1001) given in Section 5.2.3, answer the fo
allochka39001 [22]

Answer:

b

Explanation:

5 0
3 years ago
Does an android tablet have a hard drive
Kisachek [45]
No, it uses flash menory
3 0
3 years ago
Why is malware dangerous
Sonbull [250]

Malware can be hugely damaging to businesses as well as individuals. Hackers often use malware to try and gain entry into an organisation's systems or networks, from where they can access valuable data to steal and sell on.

6 0
3 years ago
Read 2 more answers
Other questions:
  • By applying styles formats are being applied ?
    14·2 answers
  • Write a c++ function, largestnum, that takes as parameters a double array and its size and returns the index of the last occurre
    14·1 answer
  • How many categories of bitmap images are there?
    8·1 answer
  • sqrt is being defined as a variable name, how do I get its math function to... well... function? (Python)
    11·1 answer
  • All of the following are ways to limit what is tracked about you online, except:
    12·1 answer
  • Meaning of ‘integrity of data’
    14·2 answers
  • Define a function called 'findWordFreq, which takes two parameters. The first parameter, 'text" is an nltk.text.Text object and
    8·1 answer
  • Is this App for real?​
    5·1 answer
  • One benefit proprietary licensed software is that it
    9·1 answer
  • What method is used in the following line of code to associate clicking the left button with the event handler "clickSingle"?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!