1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vekshin1
3 years ago
9

When searching the web software programs called fetch a few web pages and then they follow the links on those pages and fetch th

e pages they point to, and so forth?
Computers and Technology
2 answers:
ICE Princess25 [194]3 years ago
6 0

Software programs called Spiders

When you are on Google and you decide to do a search, you are not searching the web pages. What you are doing is actually searching Google’s index of the web page. This is done with programs called spiders. They start off by fetching a few web pages, then follow links to those pages and collect all the pages they point to; and follow all the links, and then again fetch the pages they link to, and so forth. This is done until we have indexed a huge chunk of the web.

Basile [38]3 years ago
6 0

Answer:

the answer is "When searching the web software programs called spiders fetch a few web pages and then they follow the links on those pages and fetch the pages they point to, and so forth?

Explanation:

You might be interested in
The computer system for a major retail store was hacked. Many addresses, credit card numbers, and other pieces of customers’ per
drek231 [11]

Answer

Cyber Security professionals

Explanation

Cyber security professionals can help the company protect itself from hackers. They are experts who will install antivirus into the software used in the company to protect virus manipulation and prevent malware. They will further encrypt the websites of the company and reset the password of the computers into two-factor authentications to make the login requirements advanced.


7 0
3 years ago
Read 2 more answers
The entirety of a packet at one Layer becoming the payload section at another is know as?
MA_775_DIABLO [31]
The answer to the question is: encapsulation
8 0
3 years ago
Read 2 more answers
The WorkOrders table contains a foreign key, ClientNum, which must match the primary key of the Client table. What type of updat
OlgaM077 [116]

Answer:

Changing the customer number on a record in the Orders table to a number that does not match a customer number in the customer table would violate referential integrity.

If deletes do not cascade, deleting a customer that has orders would violate referential integrity.

If deletes cascade, customer can be deleted and all orders for that customer will automatically be deleted.

8 0
3 years ago
How to learn python ?
laila [671]

Answer:

https://www.python.org/about/gettingstarted/

Explanation:

its a site i used

7 0
3 years ago
How was wifi made? bro
Helen [10]

Answer: "Once a Transmitter receives data from the internet, it converts the data into a radio signal that can be received and read by WIFI-enabled devices. When was WIFI invented? Wifi was invented and first released for consumers in 1997 when a committee called 802.11 was created."

(Non Of This Information Is Mine I Have No Rights Or Ownership Not For Plagiarism Purposes Information Based Only 2022.)

Explanation: ...

3 0
2 years ago
Read 2 more answers
Other questions:
  • What does "Forward" in emails do?​
    7·1 answer
  • Which letters appear in the home row on a keyboard?
    14·2 answers
  • Using the _______ list, you can select the number of photos that will appear on each slide.
    14·1 answer
  • ___ Jacking is a crime that takes place when a hacker misdirects URL to a different site. The Link Itself Looks Safe, But the us
    11·1 answer
  • Read the scenario below. Explain why this is not fair use of copyright materials. What should you do instead of using the entire
    10·1 answer
  • The part of the computer that contains the brain or the Central Park nursing unit is also known as
    10·1 answer
  • What is work flexibility?
    15·1 answer
  • Which type of fiber-optic connector, containing one fiber-optic strand per connector, is connected by pushing the connector into
    7·1 answer
  • What is geolocation?
    8·1 answer
  • Fifteen years ago, everyone didn't have a cell phone. Anyone developing an app would not have found many users. Today, the exist
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!