1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lakkis [162]
3 years ago
15

You would like to narrow your search on this topic.

Computers and Technology
2 answers:
igor_vitrenko [27]3 years ago
7 0

Answer: AND

Explanation: which combines words together to narrow a search

frozen [14]3 years ago
3 0

Answer:

Not

Explanation:

cause we are excluding keywords in a search

You might be interested in
Danielle, a help desk technician, receives a call from a client. In a panic, he explains that he was using the Internet to resea
marysya [2.9K]

Answer:

The customer's browser has been hijacked by some attackers may be.

Explanation:

According to customer's explanation there is  possibility that that his data may be stolen and he has to disconnect computer from network and then call given number in order to get back his data.

5 0
4 years ago
What does the clone tile command do?
Angelina_Jolie [31]
It allows you to create tiled copies of an object while tweaking the variables
5 0
3 years ago
Read 2 more answers
What is a back door?
V125BC [204]

Answer:

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device, or its embodiment. Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems.

Explanation:

3 0
3 years ago
Read 2 more answers
What can be used to store data, plant viruses, or steal data?
SCORPION-xisa [38]

Answer:

<u>ITS A SIMPLE ANSWER BUT THE PROBLEM IS TOO BIG!</u>

Explanation:

The phishing email might contain a link which on clicking will take you to a fake web page. For example, the link might take you to a fake bank website which looks very legitimate but in reality is just a lookalike. If the victim falls for the scam and enters his/her account details on the website, the details will actually go to the hacker's server instead of going to the bank and the hacker will have all the information that the victim has provided on the website.

4 0
3 years ago
Which of the following best describes the relationship between if/else and switch statements :
kvasek [131]
I want to say ‘A’ since if/else and switch statements are both conditional statements.
7 0
3 years ago
Other questions:
  • How to create a tender statement in database management?
    5·1 answer
  • Which of the following statements is true?
    11·1 answer
  • Why is an ISA unlikely to change between successive generations of microarchitectures
    11·1 answer
  • Micah may be able to repeat the last few digits in a phone number even if he was not paying attention. Because this is auditory
    13·1 answer
  • When you create new document, you have the option to create a blank document or a predifined
    7·1 answer
  • Create a cell reference in a format by typing in the cell name or
    12·1 answer
  • What is a resume?A collection of all your professional and artistic works.A letter which explains why you want a particular job.
    6·1 answer
  • Why might you use a navigation form instead of tab pages? The navigation form allows for several levels and sublevels to be coll
    7·2 answers
  • Ben is writing web page content on a newly launched gaming gadget. He has to use hyperlinks to help visitors navigate to web pag
    11·1 answer
  • Text that is positioned at the top of a column and labels the<br> column.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!