1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Naya [18.7K]
3 years ago
10

Search engines use _____ to discover documents for indexing and retrieval.

Computers and Technology
1 answer:
disa [49]3 years ago
4 0
The choices can be found elsewhere and as follows:

<span>a. caches
b. landing pages
c. Web crawlers
d. proxy servers
e. interstitials
</span>
I believe the correct answer is option C. Search engines use web crawlers to discover documents for indexing and retrieval. It is also known as spiders. It <span>is a software that traverses available Web links in an attempt to perform a given task.</span>
You might be interested in
What is the default zoom percentage in Word?<br><br> 50%<br> 100%<br> 150%<br> 200%
Hunter-Best [27]

Answer:

its 100%

Explanation:

5 0
3 years ago
Read 2 more answers
What is one difference between using Telnet or SSH to connect to a network device for management purposes?
Gnom [1K]

Answer:

The correct answer to the following question will be "Telnet provides a piece of login information in simple text, while this type of information is encrypted by SSH".

Explanation:

If you're using a distribution of Linux for a long period and maybe you're no longer a newbie on Linux, you might also have come through words such as telnet or SSH.

  • Today SSH is just the main application for Access to the internet between connected devices and repositories.
  • Telnet was the shared abbreviation of networking and communications and is the most well-known networking application for the UNIX framework.

So, it's the right answer.

7 0
3 years ago
To delete text to the right of the cursor, press the____ key.
KiRa [710]
You would press the backspace key
3 0
4 years ago
Read 2 more answers
How do network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS) differ?an NIDS focuses more
balandron [24]

Answer:

a. NIDS focuses more on analyzing incoming traffic, while an HIDS monitors valuable OS files

Explanation:

Intrusion detection system is used in analyzing, detecting, and raising alarm on suspicious network activities used by hackers to access unauthorized sites. Network intrusion detection system is meant to work in real-time, so as to analyze incoming traffic. Packets moving across the network are evaluated for threats.

Host intrusion detection system work within the operating system of the device to evaluate the history of system files that could contain threats, or unusual file permission changes, and then raise an alarm.

3 0
3 years ago
Where's the space key again <br> Sorry I forgot <br> I'm so inbarest sorry <br> In my computer
Kipish [7]
The space key is the longest key on the bottom of the keyboard

8 0
4 years ago
Other questions:
  • What does CMOS stand for?
    15·2 answers
  • In object oriented programming, what is another name for the "attributes" of an object?
    14·1 answer
  • What is your favourite video game??​
    5·2 answers
  • You are working on a project to develop a new or enhanced system to help people at your college, university, or organization to
    9·1 answer
  • The ________ is the part of the nail plate that extends beyond the nail bed.
    8·2 answers
  • Examples of websites that use . com
    10·1 answer
  • Two time series techniques that are appropriate when the data display a strong upward or downward trend are ___________ and ____
    14·1 answer
  • Please help ASAP !!!
    15·1 answer
  • What are LinkedIn automation tools used for?
    14·1 answer
  • Organizational behavioural aspects
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!