1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pogonyaev
3 years ago
10

A _____ is a valuable tool that enables a user to find information on the Web by specifying words or phrases known as keywords,

which are related to a topic of interest.
Computers and Technology
2 answers:
svetoff [14.1K]3 years ago
8 0

Answer:

Search Engine

Explanation:

A search engine refers to a computer application software that looks through and locates items in a database. These items will correspond to to the phrases or keywords being searched for that has been entered by a user.

On the internet or web, popular search engines are provided by google and yahoo and they are designed to carryout web search when users enter search query as keywords or phrases

Neko [114]3 years ago
5 0

Answer: search engine

Explanation: A web SEARCH ENGINE or an internet search engine is a software system that is designed to carry out web search of any information or data, it means that it search the World Wide Web. It does so in a systematic way for particular information specified in a textual web search query, yhatvis what was asked.

You might be interested in
The goal for me is that I need to identify the objects needed for the UNO card game and the actions that those objects perform,
Alik [6]

Answer:

Explanation:

//Java program

class UnoCard{

  private String color;

  private int value;

 

  public UnoCard(String color , int val) {

      this.color = color;

      value = val;

  }

  public String getColor() {

      return color;

  }

  //set the color of the card

  public void setColor(String color ) {

      this.color = color;

  }

  //get the value of the card

  public int getValue() {

      return value;

  }

  //set the value of the card

  public void setValue(int val) {

      value = val;

  }

  //return true if card has same value or

  //same color as the card

  //return false otherwise

  public boolean isMatch(UnoCard card) {

      return (this.value==card.value)||(this.color==card.color);

  }

}

public class Card {

  public static void main(String args[]) {

      UnoCard card1 = new UnoCard("Red",10);

      UnoCard card2 = new UnoCard("Green",10);

      UnoCard card3 = new UnoCard("Blue",15);

     

      if(card1.isMatch(card2))System.out.println("Match");

      else System.out.println("No Match");

     

      if(card2.isMatch(card3))System.out.println("Match");

      else System.out.println("No Match");

  }

}

6 0
4 years ago
Consider the following sequence, defined from n=2 to 15 (inclusive). Pn=n2−1. Produce a list named primes which only contains va
omeli [17]

Answer:

primes = []

for n in range(2,16):

   pn = n*n - 1

   if is_prime(pn):

       primes.append(pn)

5 0
3 years ago
What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email f
vodomira [7]

Answer:

Phishing.

Explanation:

Networks and computer systems in a network are susceptible to cyber attacks. A cyber attack is a networking term that describes a situation where a network is penetrated by a malicious process or program induced by an attacker or attackers.

A cyber attacker's sole intention is to steal information needed to achieve a malicious and devastating action to a client's personal assets. An example of such attacks is phishing.

Phishing is an attack that collects client's personal information at an imposter website after receiving an email from a person masquerading as an employee from a bank.

5 0
4 years ago
Consider a file system in which a file can be deleted and its disk space reclaimed while links to that file still exist. What pr
goldfiish [28.3K]

Answer:

By keeping track of file links and deleting them along with the files

Explanation:

when different users create different files with the same name, and one tries to open one of the files, the first file that is found on the VTOC of the disk will be opened. These problems can be avoided by  tracking of all links to a file, and whenever there is a need to delete a file,  the link to the file as well should be deleted.

8 0
4 years ago
The code below is repetitious. What is the output of this program?
expeople1 [14]

Answer:

6

Explanation:

5 0
3 years ago
Read 2 more answers
Other questions:
  • Which best describes a computer bug? A piece of computer hardware that is out of date or has a newer version a piece of computer
    14·2 answers
  • A_________ formal access control methodology used to assign a level of confidentiality to an information asset and thus restrict
    5·1 answer
  • What are some pros and cons of being a Computer Hardware Engineer?
    15·1 answer
  • To retrieve an outlook express e-mail header right-click the message, and then click ____ to open a dialog box showing general i
    7·1 answer
  • Which equation gives you the amount of work performed?
    13·1 answer
  • Define some everyday if else statements you use to determine action. What are the branches of your statement?
    12·1 answer
  • After you identify and subdivide all of the data elements for a database, you should group them by the entities with which they’
    10·1 answer
  • In a new blank word document you can typing where ?
    15·1 answer
  • For this program you will build a simple dice game called Pig. In this version of Pig, two players alternate turns. Players each
    6·1 answer
  • What does the asterisk (*) after select tell the database to do in this query?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!