1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vekshin1
3 years ago
9

When searching the web software programs called fetch a few web pages and then they follow the links on those pages and fetch th

e pages they point to, and so forth?
Computers and Technology
2 answers:
ICE Princess25 [194]3 years ago
6 0

Software programs called Spiders

When you are on Google and you decide to do a search, you are not searching the web pages. What you are doing is actually searching Google’s index of the web page. This is done with programs called spiders. They start off by fetching a few web pages, then follow links to those pages and collect all the pages they point to; and follow all the links, and then again fetch the pages they link to, and so forth. This is done until we have indexed a huge chunk of the web.

Basile [38]3 years ago
6 0

Answer:

the answer is "When searching the web software programs called spiders fetch a few web pages and then they follow the links on those pages and fetch the pages they point to, and so forth?

Explanation:

You might be interested in
An administrator has initiated the process of deploying changes from a sandbox to the production environment using the Force IDE
Pani-rosa [81]

Option A because the environment should be selected for which the changes are to be applied. In a time Force IDE has many project environments for example maybe a java project and C++ project would be there on sandbox, so the environment selection is important.

Option B because the related changed sets should be specified so that other developers that have access to the project can see the changes being made.

Option D The data fields that are needed to be deployed should also be provided so that the updated version can be seen by other developers.

Rejected Options :

Option C user name and password has nothing to do with the production environment because if the user has it only then it can come and make changes.

6 0
3 years ago
What is the primary responsibility of the physical layer in data communication?
melamori03 [73]
 It is responsible for transmitting these bits as signals over a wire, optical fiber, wireless, or other <span>medium.</span>
3 0
3 years ago
Jasmine is a commercial artist her is is the one most often used by graphic designers publishers and others in her field the os
VikaD [51]
OS is for mac so she used the mac computer
7 0
3 years ago
Businesses around the world all need access to the same data, so there
Alexxx [7]

Answer:

B

Explanation:

3 0
2 years ago
What should you always do to clean off tables
ikadub [295]
Wipe then off then spray them down then wipe off again
7 0
3 years ago
Read 2 more answers
Other questions:
  • When it comes to saving money, what is a good rule of thumb?
    5·2 answers
  • Given 3 floating-point numbers. Use a string formatting expression with conversion specifiers to output their average and their
    14·1 answer
  • A smart refrigerator can use what to detect when you are running low on milk, and then send a reminder to you on a wireless.
    8·1 answer
  • You can use RWA to demonstrate how to do something special on the web, such as displaying articles found on websites that suppor
    15·1 answer
  • Discuss FOUR challenges that have an impact on domestic tourism
    6·1 answer
  • You are utilizing BitLocker Drive Encryption, and are attempting to update Windows Server 2016. What must be done so that the up
    14·1 answer
  • Directory services store information in a heirarchical structure. Which statements about Organizational Units (OUs) of a directo
    13·1 answer
  • Discuss five domains of Instructional technology​
    7·1 answer
  • A) Calculate the checksum of following 2 bytes: 00110101 and 10101100, and fill in the blank:
    14·1 answer
  • Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ____.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!