1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kicyunya [14]
3 years ago
10

Which search engine does not track users? Choose the answer.

Computers and Technology
2 answers:
zhuklara [117]3 years ago
8 0

Answer:

I think the answer is Bing,am familiar with others

Alecsey [184]3 years ago
3 0
Bing does not track users.
You might be interested in
Which BEST identifies the primary function of the key words above?
Alchen [17]

Answer:

A. The key words help identify your reading audience.

Explanation:

Through the keyword, you can identify your reading audience. Like, suppose you are writing about Android developers as a keyword. Thus it clarifies that your reading audience will be Android developers mainly. However, the keyword has nothing to do with writing purposes or goals. We first analyze our goal, and then we search for the keyword that can be best for fulfilling our goals. Hence, keywords not in best identify the writing purpose or goal. Like I want to be rich by writing, Now keyword is Android developers, which is confirming that our reading audience will be Android developers mainly, but it does not confirm that we want to be rich, as we might write for charity as well. And keywords does not have anything to do with how much evidence you should cite or the appropriate length of your essay. And hence, A. is the correct option.

3 0
3 years ago
Which type of firewall policy calls for a firewall to deny all traffic by default?
charle [14.2K]
Restrictive policy is a kind of policy calls for a firewall to contradict all traffic by default. The first rule denies all traffic on any service and using any port. To permit a specific type of traffic, a new rule must be placed ahead of the deny all rule. A firewall should enforce the overall policy recognized by the network administrator. Enforcement is controlled mainly over setting up packet filtering rules which is a rule base comprises a set of these rules. 
3 0
3 years ago
Which component is in discreat type? A.power IC B.regular IC C.Resistor D.digital IC​
Finger [1]

Answer:

C. Resistor

Explanation:

A discrete component can be defined as any electronic component that are built as an individual or single unit.

Basically, a discrete component comprises of a single circuitry element, either an active element such as a vacuum tube, transistor etc or a passive element such as a resistor, diode, capacitor, inductor etc.

Hence, a discrete component is different from an integrated circuit (IC) or hybrid circuits because it is typically constructed or built with a single circuit element while integrated or hybrid circuits are constructed as a multiple unit.

Additionally, most discrete component are mainly semiconductors and as such consume large amounts of current.

5 0
3 years ago
Read 2 more answers
What is ""quality""?
Naddik [55]

Answer: Quality is the parameter which describes about the distinctive trait  presented by something.The measurement of the quality is based on whether or not the substance is able to fulfill the requirement of the client.

In respect with the computing field ,quality is the characteristic that is supposed to be good if there is presence of no defects or damage and is able to meet the requirement of the user or client. This parameter can be for devices, programming languages, software etc.

7 0
3 years ago
3 Characteristics of Newton’s law’s.
polet [3.4K]

Answer:

In the first law, an object will not change its motion unless a force acts on it. In the second law, the force on an object is equal to its mass times its acceleration. In the third law, when two objects interact, they apply forces to each other of equal magnitude and opposite direction.

Explanation:

4 0
3 years ago
Other questions:
  • Convert the following numbers. (Please show all steps; no marks will be awarded if no steps are shown) [1.5 x 4 = 6 marks]
    11·1 answer
  • Permission must be sought in order to use a play that is in the public domain. True or False?
    11·2 answers
  • When is e-mail an appropriate channel for goodwill messages? If you frequently communicate with the receiver by e-mail and are c
    15·1 answer
  • NIST recommends selecting cloud providers that support strong encryption, have appropriate redundancy mechanisms in place, emplo
    11·1 answer
  • Hypertext Markup language (HTML) version _____ added support for style sheets to give web designers greater control over page la
    12·1 answer
  • Write a program that deliberately contains an endless or infinite while loop. The loop should generate multiplication questions
    13·1 answer
  • You have been asked to report on the feasibility of installing an IP CCTV camera system at your organization. Detail the pros an
    5·1 answer
  • Can someone that been helping me answer one more question for please and thx
    13·1 answer
  • is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r
    6·1 answer
  • What is the viewport?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!