1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bogdan [553]
3 years ago
5

The World Wide Web is full of unstructured data. Search engines like Google, Bing and Yahoo have been doing a good job of allowi

ng users to search by key term in order to quickly locate links to websites about that particular topic. In order to do this, these search engines use what tool in order to help index and find these results?
Computers and Technology
1 answer:
aliya0001 [1]3 years ago
5 0

Answer:

Index Finders

Explanation:

* The search engine keeps the data in an index that is known as index finders which consist of the information almost all query and searching keyword.

* when we search for any website in Google, Yahoo or Bing, it searches from the keyword in the index finder and provides the correct matches.

* Index finders make the searching process too easy otherwise it is too difficult to search for different queries too fast from different pages.

You might be interested in
Information systems security is the collection of activities that protect the information system and the data stored in it.
ivann1987 [24]

Answer:

The answer is A. True.

Explanation:

Information systems security,refers to all the methods involved with assuring information integrity as well as keeping it confidential, and available.

It can also be defined as -

The detection and provisoon of solutions to security breaches.

Access controls, which prevents unauthorized system access.

Protection of information either in transit or in a storage area.

3 0
3 years ago
What type of encoding is this?<br>0x6a656c6c7966697368<br>cause I'm trying to decode it
katen-ka-za [31]
According to its structure I'd say that this is SEAL (<span>Software-Optimized Encryption Algorithm). It's difficult to describe how it works, because this kind of ciphers is very tricky. This algorithm uses 160 bit key and it uses 3 tables (R, S, T) to encode and decode.

I'll attach the image where you can see a process of creating a pseudo-random function:
</span>

7 0
3 years ago
I'm trying to connect fire stick but it doesn't have HDMI input so guys what would do you recommend to buy I tried a converter b
mihalych1998 [28]
I suggest you get a adapter from the old video input to HDMI
7 0
3 years ago
Which computer are used by mobile employees such as meter readers.​
Naily [24]

Answer:

Handheld/Mobile Computers

3 0
3 years ago
Read 2 more answers
System requirements that are important in determining if a software program will work on a computer are ____.
EastWind [94]
The RAM, System Storage ,CPU or GPU and Operating System.
5 0
3 years ago
Other questions:
  • Suppose that cells B1 through B100 of an Excel spreadsheet contain the quantity of units ordered on each of 100 different days.
    13·1 answer
  • If you are planning to carry a large balance on your credit card, which of the following credit card features should you look fo
    7·2 answers
  • Explain what a dam is and what it does
    12·1 answer
  • Consider a movie database in which data is recorded about the movie industry. the data requirements are summarized as follows:
    15·1 answer
  • Larry sent an email to Andy. Andy didn't open Larry's email but still understood what the message was. How did Andy determine th
    14·1 answer
  • Project: Math Tutor Program with Error Handling
    9·2 answers
  • Write a function max_magnitude() with two integer input parameters that returns the largest magnitude value. Use the function in
    6·1 answer
  • 9.
    8·1 answer
  • Many large companies use the word(s), _____, to refer to the huge network of computers that meets their diverse computing needs.
    12·1 answer
  • China sends a computer virus that shuts down telephone service in the United States. In retaliation, the United States hacks int
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!