1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erastova [34]
3 years ago
6

what program searches the Internet for specified keywords and returns a list of the pages where the keywords were found

Computers and Technology
1 answer:
Andrews [41]3 years ago
5 0

google does that, and yahoo, and bing. it would be a search engine, or browser.

You might be interested in
What country is now the number one source of attack traffic?
docker41 [41]

Answer:

The answer to this question is "Indonesia".

Explanation:

Attack traffic is an Alternative referred to as network traffic. The traffic is a term used to explain all data connections on a machine or computer network. When high traffic times, a machine or computer network may slow down and become jammed which is not enough for the load. There are many country attack the source of attack traffic but Indonesia is the number one country in attack traffic.

7 0
3 years ago
How can you efficiently restrict the read-only function of a requesting SNMP management station based on the IP address?
mezya [45]

Answer:

Place an ACL on the line when configuring the RO community string.

Explanation:

Controlling Access via SNMP

SNMP is a protocol used by network management systems to monitor and control network-attached devices. Ciscoworks, HP Openview, and other management stations all use SNMP.

SNMP access can be granted on a network device in two ways—read-only and read-write. Read-only access allows the management station to poll the device for statistics and other information, but it does not allow anything to be changed. Read-write access allows the management station to make changes to the configuration of the device.

It's obviously a good idea to make sure you trust the devices allowed to make changes to your configuration, but some versions of SNMP use only a simple shared password to permit access. To make this more secure, an ACL can be applied, which limits the source IP addresses that can use SNMP.

8 0
3 years ago
A browser is an example of a. :
UNO [17]
A browser is an example of a system application
5 0
3 years ago
Your server runs in quadruple-channel memory mode. How many memory controllers are being used?.
likoan [24]

Answer: four (4)

Explanation:

Quadruple means 4.

7 0
1 year ago
The ability of services to grow or shrink based on need is called __________.
Talja [164]
This kind of ability is called rapid elasticity. The resources can be maximized by a consumer to provide wider webs and applications.It can also make the server stop, just to reduce the cost in the process.  The flexibility in adapting to needs of a company is an advantage. Rapid elasticity can be done in a public cloud.
3 0
3 years ago
Other questions:
  • This stores a piece of data and gives it a specific name
    7·1 answer
  • The following algorithm should output the t times table in the format:
    6·1 answer
  • The indent buttons on the home tab allow you to increase or decrease paragraph indenting in increments of ____ inches.
    5·1 answer
  • On laptops, wireless cards tend to be attached to which panel?
    8·1 answer
  • Which type of market are you in if your firm, along with three other firms, controls 95% of the total music industry?
    13·1 answer
  • A major difference between digital librarians and traditional librarians is that traditional librarians rarely work with people.
    15·2 answers
  • Anthony is responsible for tuning his organization's intrusion detection system. He notices that the system reports an intrusion
    8·1 answer
  • 2.8 Code Practice: Question 2
    11·1 answer
  • Does anyone know a good reason WHY to change your username.
    5·1 answer
  • Write a program that computes how much each person in a group needs to pay (after tax and tip) when splitting the bill equally.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!