1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
STALIN [3.7K]
3 years ago
11

How does Google work, why does it work that way?

Computers and Technology
2 answers:
Oxana [17]3 years ago
8 0

Answer:

Google uses automated programs called spiders or crawlers, just like most search engines, to help generate its search results. Google has a large index of keywords that help determine search results. ... Google uses a trademarked algorithm called PageRank, which assigns each Web page a relevancy score.

sweet-ann [11.9K]3 years ago
6 0

Answer: Google uses automated programs called spiders or crawlers, just like most search engines, to help generate its search results. Google has a large index of keywords that help determine search results. ... Google uses a trademarked algorithm called PageRank, which assigns each Web page a relevancy score.

Explanation: Google's algorithm does the work for you by searching out Web pages that contain the keywords you used to search, then assigning a rank to each page based several factors, including how many times the keywords appear on the page. ... Google references this index when a user enters a search query.

Hope this helps^^

You might be interested in
Which rule should be followed to stay safe online
yan [13]

Answer:

The rule that should be followed to say safe online is to never give out your personal information

Explanation:

because they can hack you.....

5 0
3 years ago
Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
Vilka [71]

There are different type of vulnerability scan. The type of vulnerability scan mimics the work of a threat actor is called Credential Vulnerability Scan.

Credential Vulnerability Scan is known to be a scan in which there is a valid authentication of credentials Example are usernames and passwords etc. are known to be supplied to the vulnerability scanner to mimic the work of a threat actor that has these credentials.

They are known to be very slow but can give an in-depth insight into the system by accessing a wide range of the installed software  

Learn more from

brainly.com/question/14728460

5 0
3 years ago
What is wrong with the formula below?<br><br> SUM(A1:A5)/SUM(B1:B5)
Vlad [161]

Answer:

You forgot the "=" sign.

Explanation:

formulas in excel start with an "="

=SUM(A1:A5)/SUM(B1:B5)

4 0
4 years ago
Which of the following statements about relays is correct? A. A relay is a type of rheostat. B. A normally closed relay closes a
Sloan [31]
C. A relay is an electrical switch that works through electromagnetism. 
3 0
3 years ago
Read 2 more answers
How does limiting a company's scope benefit the company?
Alika [10]
If a company only focuses on a few things,they become a niche player in the market,therefore can demand a higher price because they are experts at only a few things.
8 0
4 years ago
Read 2 more answers
Other questions:
  • Jerry suspects that information about his internet usage was sent to external websites without his knowledge. He is wary about t
    7·1 answer
  • An attacker watches people as they enter a building requiring a key card. He waits until he sees someone who appears to be in a
    7·1 answer
  • I was not supposed to upgrade my iPad to iOS 11 due to testing but it automatically did when I was charging it. Is there a way t
    11·1 answer
  • Why is Brainly always deleting either my answers or my questions? I am putting nothing inappropriate in them. Can someone answer
    7·2 answers
  • Can you block someone on Brainly?
    7·2 answers
  • Hi weegy, what is the latest android os?
    9·1 answer
  • Employees don't have to comply with PPE requirements if they feel the PPE isn't necessary for the particular task they performed
    14·2 answers
  • The writers that most likely influenced our Founding Fathers were _____. Select all that apply. Swift and Bacon Marlowe and Kant
    14·2 answers
  • Which feature do we most likely use to quickly change the background, fonts, and layout?
    12·1 answer
  • 1.   Microsoft Office is ?​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!