1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
3 years ago
9

What does it mean to search an index or the web? (DONT TAKE ANSWERS FROM THE INTERNET!)

Computers and Technology
2 answers:
hammer [34]3 years ago
3 0

This describes the process of downloading a site's content to a search engine's server to add to its index. ... Ranking/Listing/Showing: Your website shows up in the search engine result pages. Because your site is showing up in the SERPs (search engine results pages), it means your site is.

WITCHER [35]3 years ago
3 0

Answer:

Metadata web indexing involves assigning keywords or phrases to web pages or web sites within a metadata tag (or "meta-tag") field, so that the web page or web site can be retrieved with a search engine that is customized to search the keywords field.

Explanation:

You might be interested in
How can i address inv file in c for open it?
Paul [167]
Launch a .inv file, or any other file on your PC, by double-clicking it. If your file associations are set up correctly, the application that's meant to open your .inv file will open it.
Or else
With a extension?
5 0
3 years ago
In the well-known ____________________ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and ins
Oduvanchick [21]

Answer:

MAN IN THE MIDDLE

Explanation:

Man in the middle attack is an attack where the attacker secretly relays and possibly alters the communications between two parties. When data is sent between a computer and a server, a cybercriminal can get in between and spy or eavesdrop.

A man in the middle attack can positions himself in a conversation between a user and an application in other to impersonate one of the parties, making it appear as if a normal exchange of information is underway.

In a man-in-the-middle cyber-attack, the attacker places themselves in between two devices and monitor packets from the network, modifies them, and inserts them back into the network without the other parties knowing.

3 0
3 years ago
What is the relationship between interoperability and the other quality attributes highlighted in this book? For example, if two
Lina20 [59]

Answer:

Interoperability is the ability of or degree to which two or more systems usefully exchange information via interfaces in particular context. Interoperability can be defined in two ways which includes the ability to exchange data (syntactic interoperability) and also the ability to correctly interpret the data being exchanged (semantic interoperability).

If two systems failed to exchange information properly, it means they are not clear to interpret and not easy to communicate and get proper information from each other and that might result in a failed communication which is in turn result in security flaw.

Other quality attributes strongly related (at least potentially) to interoperability is Application Programming Interface (API)

API is a software intermediary that allows two applications to communicate to each other and are necessary for systems interoperability.

8 0
3 years ago
I wiil mark brainlist ​
Darina [25.2K]
CAD is the answer you require, but it may also be Spread sheet

Hope this helped ♥︎
5 0
3 years ago
Under what conditions might the Justice Department approve a merger between two companies that operate in an industry with a pos
pogonyaev

Answer:

Explanation:

Overall an industry with a post merger Herfindahl-Hirschman index value of below 1500 is considered un-concentrated.In an extreme case,if the Herfindahl-Hirschman index in an industry exceeds 2900,it suggest that the industry is highly concentrated.

In that case if a merger is going to occur which is expected to raise the Herfindahl-Hirschman index by 255 points,then the FTC and DOJ might challenge a lawsuit against such merger,some other factor are also scrutinized.

This include economies of scale,economies of scopes and the ease in which there is an entry possible in the industry,The agencies like FTC and DOJ try to block horizontal merger if it expected to create unsuitable economic business environment for other firms in the industry

3 0
3 years ago
Other questions:
  • Please help me I just bought a camera and I really wanna shoot in manual mode but I have like the basics down Shutter speed is l
    9·1 answer
  • You're allowed to use a cell phone while driving as long as there isn't any oncoming traffic.
    8·2 answers
  • "The effectiveness of memory retrieval is directly related to the similarity of cues present when the memory was encoded to the
    11·1 answer
  • A(n) ____________________ is hardware or software that blocks or allows transmission of information packets based on criteria su
    13·1 answer
  • Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not acces
    5·1 answer
  • 3. In 1989, the first handheld console was released by _____ and it was called ________.
    13·1 answer
  • A gui allows you to interact with objects on the screen such as icons and buttons true or false
    7·1 answer
  • Which important aspect of the Roman Empire did the barbarians destroy?
    14·2 answers
  • What is the role of computer in education sector?​
    13·1 answer
  • What instructions would a computer have the hardest time completing correctly
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!