1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
STALIN [3.7K]
3 years ago
11

How does Google work, why does it work that way?

Computers and Technology
2 answers:
Oxana [17]3 years ago
8 0

Answer:

Google uses automated programs called spiders or crawlers, just like most search engines, to help generate its search results. Google has a large index of keywords that help determine search results. ... Google uses a trademarked algorithm called PageRank, which assigns each Web page a relevancy score.

sweet-ann [11.9K]3 years ago
6 0

Answer: Google uses automated programs called spiders or crawlers, just like most search engines, to help generate its search results. Google has a large index of keywords that help determine search results. ... Google uses a trademarked algorithm called PageRank, which assigns each Web page a relevancy score.

Explanation: Google's algorithm does the work for you by searching out Web pages that contain the keywords you used to search, then assigning a rank to each page based several factors, including how many times the keywords appear on the page. ... Google references this index when a user enters a search query.

Hope this helps^^

You might be interested in
Which of the following is the BEST solution to allow access to private resources from the internet?
notsponge [240]
FTP stands for file transfer protocol. FTP is used to transfer files between computers over the Internet. FTP servers can be setup to allow users to access the information anonymously or require registration for access.
7 0
3 years ago
Which windows command always navigates the command-line interface back to the root directory?
Pie
The answer is "cd \".
5 0
3 years ago
A ____ is a key-dependent, one-way hash function that allows only specific recipients(symmetric key holders) to access the messa
Alexxx [7]

Answer: (C) MAC

Explanation:

MAC is stand for the message authentication code and it is one of the key dependent hash function. Message authentication provide the data integrity and also the origin of data authentication.

  • It basically allow the specific recipients known as the holder of the symmetric key.
  • The message authentication code uses the CBC (Cipher block chaining) mode for constructing the MAC algorithm and it also uses the block cipher for the conjunction by using the CBC operations.    

On the other hand, all the options are incorrect as they are not the key dependent hash function.

Therefore, Option (C) is correct.

7 0
3 years ago
A palindrome is a string that is the same regardless of whether your read it forward or backward, assuming you ignore the spaces
pashok25 [27]

Answer:

The explanation for this question is describes in the explanation section below.

Explanation:

A palindrome is a number, string, expression or certain character pattern that appears the very same backward as a forward.

Below is an algorithm for the series:

Step 1: Creates an object of generic stack-type of string set.

Step 2: Accept the sequence from those in the user as its entry.

Step 3: Throughout the specified set, disregard the white space.

Step 4: Build an object for the reverse string to be stored.

Step 5: To store the stack into the string, place the object that has come into the stack.

Step 6: Test whether the reversed string equals the initial string.

Step 7: Display the message of success.

Step 8: Display the message of failure when the strings aren't the same.

6 0
3 years ago
The natural functions of Earth seem all _____ in one way or another.
Sonja [21]
Would it be Similar ?
4 0
3 years ago
Other questions:
  • Write a function max arguments. write a program that reads three floating-point numbers, uses the max function, and displays the
    5·1 answer
  • You need to prevent the use of tftp through your firewall. which port would you block?
    9·1 answer
  • what is it called when someone uses software to run multiple operating systems on one computer at the same time? A.functional vi
    9·1 answer
  • Which TranscribeMe tag should you use if you are unable to make out a word or phrase due to a difficult accent, poor audio, or a
    6·1 answer
  • Alice is working on a web page to attract the maximum number of people to join her cause. She wants to inform people about the b
    12·1 answer
  • What does the statement that follows do? double gallons[6] = { 12.75, 14.87 }; a. It assigns the two values in the initializatio
    13·1 answer
  • What is a Computer ?and it's demerits​
    13·2 answers
  • 2. How does the internet give us the ability to communicate?
    15·1 answer
  • What is adb command???​
    6·2 answers
  • I have all of the points and brainliest, but it won't level up, I don't know why, anyone know why?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!