1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sedaia [141]
3 years ago
14

Most search engines provide specific pages on which you can search for____ and

Computers and Technology
2 answers:
vazorg [7]3 years ago
7 0

Answer: c

Explanation: a

nalin [4]3 years ago
3 0

Answer:

i think 1.b and 2.a

Explanation:

im not to sure

You might be interested in
The area of ai that investigates methods of facilitating communication between computers and people is?.
icang [17]

The area of ai that investigates methods of facilitating communication between computers and people is natural language processing.

<h3>What is synthetic intelligence conversation?</h3>

Communication and synthetic intelligence (AI) are carefully related. It is conversation – specifically interpersonal conversational interaction – that offers AI with its defining check case and experimental evidence.

Natural language processing (NLP) refers back to the department of laptop science—and greater specifically, the department of synthetic intelligence or AI—worried with giving computer systems the cap potential to recognize textual content and spoken phrases in a whole lot the equal manner human beings.

Read more about the communication :

brainly.com/question/26152499

#SPJ1

3 0
1 year ago
What is the preferences of occupation in ones life?
umka21 [38]

Answer:

mark me brai list i request u

6 0
3 years ago
____ is a technology that exists inside another device
Julli [10]

Answer:

Embedded technology is a technology that exists inside another device.

8 0
3 years ago
Read 2 more answers
Why is malware dangerous
Sonbull [250]

Malware can be hugely damaging to businesses as well as individuals. Hackers often use malware to try and gain entry into an organisation's systems or networks, from where they can access valuable data to steal and sell on.

6 0
3 years ago
Read 2 more answers
Which loan type requires you to make loan payments while you’re attending school?
Levart [38]
<span>A:Unsubsidized federal loan</span>
7 0
3 years ago
Other questions:
  • You are tasked with securing a small network for a client in which the following requirements must be met: If a user on the priv
    8·1 answer
  • ___ is the branch of computer science that explores techniques for incorporating aspects of intelligence into computer systems.
    5·1 answer
  • An output device is any device that displays, prints, or plays content stored on a computer. from the list below, identify the d
    14·1 answer
  • Web and mobile applications are created for users to only read information. True False
    15·2 answers
  • When Hallmark designs its website so that a teenage girl can send a theme card to her boyfriend's cell phone, what is the primar
    6·1 answer
  • Some architectures support the ‘memory indirect’ addressing mode. Below is an example. In this case, the register R2contains a p
    8·1 answer
  • Two types of formulas in Excel, what are they? A. Complex and simple, B. General and currency, C. Logical and Boolean, D. Trig a
    15·1 answer
  • . How is using 0 / 1 or true / false in specifying digital an abstraction?
    11·1 answer
  • Tell me the most scariest website you know and i'll give you brainlest
    5·1 answer
  • We can create tables in MS. Word from *<br> 2 points<br> Insert Tab<br> Home Tab<br> Mailings Tab
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!