1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maw [93]
3 years ago
10

Which describes the first step a crawler-based search engine uses to find information?

Computers and Technology
2 answers:
elena-14-01-66 [18.8K]3 years ago
6 0
C is the correct answer to the problem
Inessa05 [86]3 years ago
4 0

Answer

option C) Text and keywords are selected and recorded in huge data centers.

Explanation:

A crawler can be defined as a a program that visits Web sites and reads their pages and other information and after reading creates entries for a search engine index. The major search engines on the Web all have such a program, which is also known as a "spider"

You might be interested in
What is the output for the following program?
Lelu [443]

Answer:

Output:

15

20

25

Explanation:

In first iteration value of num is 10. Condition is checked 10 is less than 21 so value of num is incremented by 5 and value 15 is printed than again condition is checked 15<21 so value of num is incremented again and 20 is printed. Again condition is checked 20<21. So 25 is printed. Then 4th time when condition is checked vakue of num is 25 and while loop condition becomes false because 25 is not less than 21 and program is terminated here.

6 0
3 years ago
____________________ are compromised systems that are directed remotely (usually by a transmitted command) by the attacker to pa
Talja [164]

Answer: Zombies

Explanation: Zombie is a computer device that is responsible for the compromising the system and making it prone to several destruction such as the Trojan horse virus,hackers and other viruses as well. Zombie makes the computer system to get malfunctioned easily ,that is without much security and various malicious functions can be performed.They basically act as the infected computer .

6 0
3 years ago
Read 2 more answers
What was the original name of the Dream SMP?
Naddik [55]

Answer:

Dream Team SMP

Explanation:

7 0
1 year ago
Read 2 more answers
A program executes 15 billion instructions. You are running this program in two systems: System A: has a processor with 3 GHz an
katrin2010 [14]

Answer:

CPU clock cycles = Instruction count x CPI.

CPU execution time =

= CPU clock cycles x Clock cycle.

= Instruction count x CPI x Clock cycle.

T =

I.

x CPI x C

Explanation:

i'm guessing

7 0
3 years ago
Write a C program that stores the number 123.45 in the variable alpha, 98.76 in the variable beta, and 76.67 in the variable gam
Anon25 [30]

Answer:

C

Explanation:

the answer

8 0
2 years ago
Other questions:
  • An outline is most like which of the following?
    7·1 answer
  • You can tell that the equals() method takes a ____ argument because parentheses are used in the method call.
    6·1 answer
  • Why is a networked system a benefit?
    7·1 answer
  • HELP ASAP!!!
    11·2 answers
  • HTML is the authoring language developed to create web pages and define structure and layout of a web document
    13·2 answers
  • Explain what happens if you try to open a file for reading that does not exist.
    10·1 answer
  • Your company decided to upgrade the older office Ethernet network and needs the fastest speed possible but has decided against f
    8·1 answer
  • How is knowing how to use word or docs importamt?
    8·1 answer
  • (Java) Write a program that accepts a number of minutes and converts it both to hours and days. For example, 6000 minutes is 100
    10·1 answer
  • The Western Siberian Plain is __________ in some places because it has poor natural draining systems.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!