1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kryger [21]
3 years ago
12

What does Putting a word in quotation marks on your search bar do on google?

Computers and Technology
1 answer:
Nostrana [21]3 years ago
6 0

Answer:

it has it look up different sites related to study instead of the deffintion and what it means

Explanation:

You might be interested in
Which of the following is an example of a database?
Katyanochek1 [597]
I think it’s A or D hope that helps
6 0
3 years ago
Read 2 more answers
Difference between array processor and vector processor​
Gala2k [10]

Answer:

An array is used for the storaging the paticular given size element that is either fixed or given by the user. However an vector is also used for storing purpose but the size of the table is assign automatically during the running time of the program or we say dynamic size assign to table.

5 0
3 years ago
Read 2 more answers
A hacker using information gathered from sniffing network traffic uses your banking credentials from a recent transaction to cre
adell [148]

Answer: a replay attack, a replay attack is used so that the attacker can go sniff out the hash, and get whatever they are trying to get, then once it goes to the attacker it will go back to the original connection after replaying the hash

3 0
3 years ago
Which of the following is the correct way for writing JavaScript array?
Ostrovityanka [42]
<h3>\large\bold{\underline{\underline{Answer :-}}}</h3>

<h3> C. var salaries = new Array(39438,39839,83729) </h3>

8 0
2 years ago
Read 2 more answers
Which tool allows users to share code and also serves as a social networking
nikklg [1K]

Answer:

D. GitHub

Explanation:

A P E X

8 0
3 years ago
Other questions:
  • Which type of attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept
    10·1 answer
  • The risk of carbon monoxide poisoning can be reduced by
    12·1 answer
  • Which of the following allowed Temple Grandin to design more humane means of slaughtering cattle? she treated the cattle as inca
    5·2 answers
  • A group of computers that are interconnected in order to share information or documents is called a _____
    9·1 answer
  • One of the prominent movies released in the 1950s is
    15·2 answers
  • Ashley Baker has been the webmaster for Berryhill Finance only ten days when she received an e-mail that threatened to shut down
    13·1 answer
  • Which of the following statements is false? a. As of Java SE 8, any interface containing only one method is known as a functiona
    6·1 answer
  • Uploading Your Work
    14·1 answer
  • Where do we manage POS? ​
    6·1 answer
  • Is e commerce a challenge or opportunity to the freight forwarder
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!