1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
julia-pushkina [17]
3 years ago
11

A tool that is used to search for and gather data from a page on the internet is called a ?

Computers and Technology
2 answers:
pshichka [43]3 years ago
8 0
It is called a sesrc engine
Pavel [41]3 years ago
8 0
Search engines use spiders to crawl accross the web indexxing everything.
You might be interested in
What are the requirements of a data dictionary ?
rodikova [14]
While these are the core elements of a data dictionary, it's not uncommon to document additional information about each element, which may include the source of the information, the table or concept in which the attribute is contained, the physical database field name, the field length, and any default values.
8 0
3 years ago
Read 2 more answers
Most licensing agencies offer an orientation meeting for applicants who want to obtain licensing for a child care facility or a
Eva8 [605]
The correct option is C.
Licensing agencies organised orientation meetings for those newly seeking day care facility license in order to educate  and familiarize them with the requirements that must be met and the laws and regulations that govern operating a day care facility. This orientation meeting usually equipped the participants with the information they need to succeed in the business.<span />
5 0
3 years ago
Read 2 more answers
SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SUSSY SU
frutty [35]

Answer:

Hi what do you mean by this I don't know

Explanation:

But please mark me brainliest thanks

5 0
2 years ago
Read 2 more answers
Which of these technologies has been most used by terrorist organizations?
Paha777 [63]

Answer:

Phishing and Social Media

Explanation:

A quick web search can give you this information. Terrorist organizations have used social media to socially engineer innocent people into joining their organizations and more. Phishing is also an attack that's used to obtain critical information such as hashes or plaintext credentials to get into people's accounts. This is a tactic that's also been used by terrorist organizations in the past.

5 0
2 years ago
What are some facts about webmasters?
FromTheMoon [43]
Webmasters monitor  the server to be sure  it is  running,Some webmasters decide what kind of  computer will hold a websites information ,Some webmasters abuse other sites by exploiting their comment fields.
4 0
3 years ago
Other questions:
  • 4. What aspect of the initial database planning process would the formula (0 + Pt × 3 + p)/5 be used in?
    5·1 answer
  • Which is a benefit of peer-to-peer networking?
    10·1 answer
  • Your network has had long power outages that have caused Hyper-V servers to shut down after the UPS battery is drained. When pow
    8·1 answer
  • Graphs and charts are two different elements. True or False
    15·1 answer
  • What does the history feature in a web browser do
    10·1 answer
  • Which famous individuals was born on october 31st?
    7·1 answer
  • if a second system failure occurs while the first recovery is in progress, what needs tobe done after the system recovers for th
    11·1 answer
  • When an object is acted on by unbalanced forces, the object will always
    11·1 answer
  • If cell G7 contains the function ________, it states that if the value in cell C3 is 9, the number 7 will be assigned to cell G7
    6·1 answer
  • Select the three concepts of capital outlay.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!