1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jonny [76]
4 years ago
12

Search engines enable you to

Computers and Technology
1 answer:
Phoenix [80]4 years ago
4 0

Located web pages related to a specific subject


Please let me know if you have questions !

You might be interested in
Though most of the content on this social network is uploaded by amateurs, many companies offer streaming video content related
Nikitich [7]
The answer to this is the youtube channel. The youtube channel is very common and very popular to everyone. Each and every one of us could not deny that we would watch a video from youtube maybe at least once a day. Youtube is very effective, it is also very efficient and easy to use.
6 0
3 years ago
What service uses a private cloud in conjunction with a web browser or downloaded client software to access desktop software?
dmitriy555 [2]

Answer:

The answer is Remote desktop services.

Explanation:

What service uses a private cloud in conjunction with a web browser or downloaded client software to access desktop software?

The answer is Remote desktop services.

Desktop virtualization is a software technology that separates the desktop environment and associated application software from the physical client device that is used to access it.

Desktop virtualization can be used in conjunction with application virtualization and user profile management systems, now termed "user virtualization", to provide a comprehensive desktop environment management system. In this mode, all the components of the desktop are virtualized, which allows for a highly flexible and much more secure desktop delivery model. In addition, this approach supports a more complete desktop disaster recovery strategy as all components are essentially saved in the data center and backed up through traditional redundant maintenance systems.

6 0
3 years ago
With the evolution of RFID instead of UPC, how will this capability make the production grow and improve inventory and security?
saw5 [17]

Answer:

RFID in a business setting as keycards to enter into specific rooms and Elevator control. RFID will eventually have more applications and security then Barcode.

Explanation:

6 0
4 years ago
Sharon has multiple tables in her database. she wants to view related records in those tables. what should sharon do to view the
den301095 [7]

according to plato she should create relationships between the tables

3 0
3 years ago
Task 5: Create the GET_CREDIT_LIMIT procedure to obtain the full name and credit limit of the customer whose ID currently is sto
lidiya [134]

The SQL statement that would create the GET_CREDIT_LIMIT procedure to obtain the full name and credit limit of the customer is:

GET_CREDIT_LIMIT

SELECT CUST_ID 125

FROM FIRST_NAME, LAST_NAME, CREDIT_LIMIT

WHERE LAST_NAME ="Smith"

<h3>What is SQL?</h3>

This is an acronym that means Structured Query Language that is used in handling data in a database.

Hence, we can see that from the attached image, there is a table that contains the details of customers and their various data such as their first and last names, credit limits, address, etc, and the  GET_CREDIT_LIMIT procedure is shown above.

Read more about SQL here:

brainly.com/question/25694408

#SPJ1

3 0
2 years ago
Other questions:
  • A suspension system that allows one wheel to move up and down with minimal effect on the opposite wheel is called what? A. Stabi
    14·2 answers
  • Pleas help with this question: Which statement about word processing software is true?
    15·1 answer
  • If you need to multiply 400, 2, and 1 ½, what would you type on the numeric keypad?
    9·2 answers
  • Whats the difference between firms that provide services and firms that sell products?
    7·2 answers
  • Which method do software testers use to isolate new code from the rest of the network during the test stage of the software deve
    15·1 answer
  • Sound can be converted from the electrical energy inside a computer into the mechanical energy of soundwaves in air by using
    9·1 answer
  • Select the correct answer.
    11·1 answer
  • Is anyone a robIox moderator?
    13·2 answers
  • An articulated robot has a T-type wrist axis that can be rotated a total of 2 rotations (each rotation is a full 3600 ). It is d
    15·1 answer
  • What do you think entertainment or gaming platforms will look like in the future?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!