1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zzz [600]
3 years ago
13

Google is an example of a(n):

Computers and Technology
1 answer:
Andre45 [30]3 years ago
7 0
Well i see your X so i would say you were correct it is a search engine.
You might be interested in
What is the definition of hardware
wel
<span>the machines, wiring, and other physical components of a computer or other electronic system.</span>
3 0
3 years ago
Read 2 more answers
Which statement describes one of the responsibilities of a computer programmer?
galben [10]

Answer:

d i think

Explanation:

6 0
3 years ago
Where can a user find available templates and themes in PowerPoint?
jenyasd209 [6]

Can look under the design tab to find a handful of slide themes to choose from including an option to browse from to get a theme that you personally saved.

3 0
3 years ago
There are many advantages and some disadvantages to using social media. Explain at least one of the advantages to
OverLord2011 [107]

Answer:  yes

Explanation:social media has the advantage of long distance communication and a disadvantage is cyber bullying and yes i thank if most people where nice long social media is good  

3 0
3 years ago
What technology uses mathematical algorithms to render information unreadable to those lacking the required key
hoa [83]

Data encryption is the name of the technology that uses mathematical algorithms to render information unreadable to those lacking the required key.

<h3>What is Data encryption technology?</h3>

This is a technology that helps to secure data by applying a technique known as cryptography. What this basically means is that a secret code (or key) is generated which would provide access to the cryptographically stored information, and failure to provide the correct key makes the data or information unreadable.

You can learn more about how data encryption works here brainly.com/question/9238983

#SPJ1

6 0
2 years ago
Other questions:
  • Why is the protocol down, even though you issued the no shutdown command for interface vlan 99?
    5·2 answers
  • What is the term for an e-mail server program that receives sent messages and delivers them to their proper destination?
    14·1 answer
  • 2. A body is thrown vertically<br>100 m/s Theme taken to retum​
    13·1 answer
  • Which fingers should you use to type the reach keys?
    12·1 answer
  • Which design element is used to convey smoothness or roughness in a design
    12·1 answer
  • Look at the following description of a problem domain:The bank offers the following types of accounts to its customers: saving a
    8·1 answer
  • How can I download music and films at home without breaking the law?
    11·2 answers
  • Can I have some help?
    11·1 answer
  • If I bought mine craft p.e. for 7.99 and hook my Micro soft account up, will i get java edition
    11·1 answer
  • T/F static development is the process of constructing the programs and code modules that serve as the building blocks of the inf
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!