1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delvig [45]
3 years ago
13

Who can search the internet and select element base on important words

Computers and Technology
1 answer:
disa [49]3 years ago
6 0
I believe it is ctrl f or ctrl shift f
You might be interested in
What is an objective of state-sponsored attackers?
Keith_Richards [23]

Answer:

The correct answer is 2. To Spy on citizens

Explanation:

State-sponsored attackers have particular objectives aligned with either the political, commercial or military interests of their country of origin. Investigation shows that “the reality is that if a determined, state-sponsored adversary wants your data, they’re going to get it unless another state-sponsored entity helps you defend it.”

7 0
3 years ago
                                                       HELP PLEASE 
Marina CMI [18]
Your answer should be mode







5 0
3 years ago
Read 2 more answers
The MIQ inventory measures how much you value status. Which two measures are measures of status?
Alika [10]
It would be the social standing of a person and the economic standing of a person. 
6 0
3 years ago
Which of the following protocols support the encryption and decryption of e-mail messages?
Katena32 [7]
It seems that you have missed the necessary options for us to answer this question so I had to look for it. Anyway, here is the answer. The protocol that supports the encryption and decryption of e-mail messages is this: <span>Secure Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP). Hope this helps.</span>
7 0
3 years ago
What would the range(3, 9) function generate?
gregori [183]

Answer:

A, 3,6,9

is the answer

Explanation:

bc it count by

3 0
3 years ago
Other questions:
  • Consider a multiprocessor CPU scheduling policy. There are 2 options: 1) a singlecommon ready queue of jobs; when a CPU becomes
    8·1 answer
  • Which one of the following is an example of hacktivism according to you and why?
    11·1 answer
  • Which describes which CTSO each student should join?]
    7·1 answer
  • Your task is to write a C program that measures the latencies of various system calls. In particular, you want to know 1) the co
    5·1 answer
  • Is 5g harmful to the body ?
    9·2 answers
  • Next, Leah wants to add a content slide that allows her to insert a table.
    8·2 answers
  • Which is a concept of the CIA of Computer Security
    7·1 answer
  • Predict the output
    7·1 answer
  • If a machine cycle is 2 nanoseconds , how many machine cycles occur each second?
    7·1 answer
  • I need help with this question.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!