1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vekshin1
3 years ago
9

When searching the web software programs called fetch a few web pages and then they follow the links on those pages and fetch th

e pages they point to, and so forth?
Computers and Technology
2 answers:
ICE Princess25 [194]3 years ago
6 0

Software programs called Spiders

When you are on Google and you decide to do a search, you are not searching the web pages. What you are doing is actually searching Google’s index of the web page. This is done with programs called spiders. They start off by fetching a few web pages, then follow links to those pages and collect all the pages they point to; and follow all the links, and then again fetch the pages they link to, and so forth. This is done until we have indexed a huge chunk of the web.

Basile [38]3 years ago
6 0

Answer:

the answer is "When searching the web software programs called spiders fetch a few web pages and then they follow the links on those pages and fetch the pages they point to, and so forth?

Explanation:

You might be interested in
Combustion is an example of to energy conversion.
Marizza181 [45]
If this is a true or false question I would say true... but I dont know I’m confusion <3
7 0
3 years ago
How are computers used in education and entertainment? List them.​
Sliva [168]

Answer:

The answer to this question is given below in this explanation section.

Explanation:

              "computers used in education and entertainment"

Computers started as very and simplistic machines data.Most of these files were text-based reports used in a work environment.As technology advanced,computer became increasingly versatile in what they could do.With the creation of the internet and faster processors,file sharing and entertainment became a popular use for personal computer everywhere.Computer have endless users in the entertainment industry by directly marketing products to users.

  • Music
  • Television and movies
  • Art
  • Games

Many websites services allow users to purchase individual tracks or albums directly to their computer.Most record labels take advantage of these services to makeup for lost revenue from illegal downloading.

When the advantages of video card and internet speed,moving and streaming television are now at the click of a mouse button.Some websites even offer free streaming episodes of certain TV series with internet commercials.

Art is something that is readily available online at any moment. Pictures,Painting,Poetry and more are just a click away.Popular browsers offer specific image search option to quickly browse through art with a single keyword.Beside general use,computer photo editing programs and animation programs are also the sources behind most movies and professional photographs.

6 0
3 years ago
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
3 years ago
Read 2 more answers
Which of the instances below is an example of a Trojan horse? Question 2 options: a) An attachment in an email that is really a
sergij07 [2.7K]

Game-theif Trojans is the malware that makes a backdoor into your email account by which you are playing a game or has downloaded it and thus by this all information of user is exposed.

So option D is the answer.

Option A cannot be answer because Trojan does not use files for its purpose.

Option B cannot be a good option because Trojan works in online could.

Option C cannot be a option because Trojan does not need executable to attack your account.

3 0
3 years ago
Read 2 more answers
I'm trying to network two laptops together using ethernet cable but it isn't working. Why isn't it working
sladkih [1.3K]

Yes the ansewer is c bc you can look it up!

8 0
3 years ago
Other questions:
  • To include totals and other statistics at the bottom of a datasheet, click the ____ button on the HOME tab to include the Total
    12·1 answer
  • What special identity group specifically includes any user account (except the Guest) logged into a computer or domain with a va
    14·1 answer
  • A species of snake lives in a rainforest. Which would be an adaptation for this
    10·2 answers
  • Assume that a text box named PhoneNumberTextBox appears on a form and contains the phone number 414-555-5555. What value will di
    5·1 answer
  • As long as users refer to files in the ____ directory, they can access the files without entering the absolute filename.
    10·1 answer
  • Describe data center technology and its relevance to modern-day cloud computing
    14·1 answer
  • Combinations of spaces and special characters can be used in domain names of uniform resource locators (urls).
    6·2 answers
  • Change the shape fill color to Dark Red. It is the first option in the Standard Colors section of the color palette.
    13·1 answer
  • Match each method of communication with its intended purpose.
    14·1 answer
  • What should you try first if your antivirus software does not detect and remove a virus?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!