1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali [406]
3 years ago
14

Each of the following are advanced strategies you may use to help you conduct a search on the Internet except _____. using a wil

d card in your search trying a different search engine doing a Boolean search entering keywords into a Web crawler whoever answers first gets brainliest
Computers and Technology
2 answers:
Ede4ka [16]3 years ago
5 0
Your answer is trying a different search engine, there’s nothing advanced in that
malfutka [58]3 years ago
4 0

i cant see anything tho theres nothing there

You might be interested in
Given the following MIPS Code Fragment:
galben [10]

Answer:

There are 3 Data Hazard

Explanation:

Find attached the solution

6 0
3 years ago
The process of capturing moving images on film or a digital storage device is called?
galben [10]

Answer:

Cinematography

Explanation:

Cinematography is the blend of art and science and it deals with the recording of moving images on film or a digital storage device.

While making a movie some example of cinematography are the conclusions reached about lighting, camera filters, lenses etc.

6 0
3 years ago
Which characteristic of Cloud computing allows data centers to better manage hard drive failures and allocate computing resource
MrMuchimi

Answer:

When working with cloud computing, drive failures and need for usage and data is easily identifiable, so in short term, all of the things that show the user/s what needs to be done is the characteristic.

Explanation:

5 0
2 years ago
Several words separated by spaces used in place of a password are called what?
gavmur [86]
Answer is a passphrase

Passphrase consists of characters longer than passwords used in creating digital signatures. As compared to passwords, passphrases are easier to remember and considered more secure due to the overall length. Both Passphrase and passwords serve the same purpose of securing sensitive information.

7 0
3 years ago
Proxy servers and ACLs on network devices are examples of non-security devices with security features, while firewalls and IDS/I
RideAnS [48]

Answer:

True.

Explanation:

A proxy server, for example, can hide the true origin of a request, thus, keeping your IP address private, and non-visible to the internet. However, this won't necessarily keep malicious attackers from reaching your network. A proxy simply acts as an intermediary between you, and the server you are trying to reach.

Firewalls or an Intrusion Detection Systems (IDS) are pieces of software specifically designed to keep attackers out of your system, they can analyze the web traffic and detect malware, or they can prevent the delivery of some packages, based on its content if the IDS consider it's malicious.

6 0
3 years ago
Other questions:
  • A patent facilitates a government-approved technological monopoly by
    5·1 answer
  • Write the Python code to implement each step of the following algorithm. Your code should use descriptive variable names and per
    7·1 answer
  • Computers help eliminate the repetitiveness of manual tasks. How can this benefit you in your overall career?
    9·2 answers
  • What is the web of trust
    7·2 answers
  • How does natural gas move through pipelines from the well head to the end user thousands of miles away
    5·1 answer
  • A python program for the following output using for loop.
    13·1 answer
  • What is bug in computer?​
    12·1 answer
  • How to test someone elese internet speed from a distance
    15·1 answer
  • Select the correct answer.
    7·1 answer
  • Print("Weight on Earth?")
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!