1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sladkih [1.3K]
3 years ago
11

When a web page author includes meta keywords, like sex, that have little to do with the information on the page, the author is

engaging in ____.?
Computers and Technology
1 answer:
OLga [1]3 years ago
8 0
This practice is known as "ClickBait".
You might be interested in
25% of 60 min<br> 20% of 60 min<br> 33%% of 60 min
Alexxx [7]
15
12
19.8 cool cool cool
7 0
2 years ago
. Is it conceivable to design a secure operating system for these computer systems? Give arguments for and against.
Lena [83]

Answer:

A favor:  porque permite manejar la memoria, disco, medios de almacenamiento de información y los diferentes periféricos o recursos de nuestra computadora, como son el teclado, el mouse, la impresora, la placa de red, entre otros.

En contra:

Si uno llega a fallar con un codigo en algun sistema puede verse afectado el dispositivo

Explanation:

8 0
3 years ago
first 2 questions are true or false the last question is multiple choice. 7th grade work. plz only answer if u know.
pshichka [43]

#4 is true

We use pseudocode to help us understand code.

#5 is false

Strings are surrounded by quotes, integers are not.

#6 is 100.

Integers are numbers with no decimal places.

3 0
3 years ago
Julian downloaded some of the music he created to play for his friend. Julian's friend wore headphones to listen to the music. A
Alexxx [7]

Answer: An output device

Explanation:

Headphones are the hardware output device and it use in the purpose of listening audio and music and watching movies without any interruption and distributing others.

It can used in the computer system by plugging it in or connecting it with the speakers.

We can connect headphones to the computer system which basically result in output as sound in the headphones and then it is not needed to use USB headphones.

4 0
3 years ago
Read 2 more answers
Either a function’s _________ or its _________ must precede all calls to the function.
faltersainse [42]

Answer:

Definition, Prototype

Explanation:

A function prototype is the one who declares return type,function name and parameters in it.

<u>Syntax of function prototype </u>

      returnType functionName(type1 argu1, type2 argu2,...);

Function definition contains the block of code to perform a specific task.

<u>Syntax of function definition</u>

            returnType functionName(type1 argu1, type2 argu2, ...)

          {

             //body of the function

           }

Whenever a function is called, the compiler checks if it's defined or not and control is transferred to function definition.

So,it is necessary to define the return type and parameters of the function.

8 0
3 years ago
Read 2 more answers
Other questions:
  • The _____ is a computer-based test that measures the degree to which you associate particular groups of people with specific cha
    13·1 answer
  • Illustrate the process of using an operating system to manipulate a computer’s desktop, files and disks.
    12·1 answer
  • The manager of a sports club has data about the club members' ages in a workbook. He wants to find which age is most common. Whi
    13·2 answers
  • What internet service provider first dominated the internet in the 1990s?
    15·1 answer
  • You can use the results from a search on a database in all of these ways except to ____.
    11·2 answers
  • A(n) ________ is a specific type of computer program that manages all programs on a computer.
    8·1 answer
  • What output is generated by this for loop?
    6·1 answer
  • The lower band and upper band of integer data type​
    6·1 answer
  • (a) Write a program which calculates and displays the obtained marks, percentage in six subjects and assigns grades based on per
    6·1 answer
  • Which of these technologies has been most used by terrorist organizations?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!