1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
seraphim [82]
3 years ago
11

In 2 or 3 sentences, describe one advanced stradegy and how its useful

Computers and Technology
1 answer:
Tanzania [10]3 years ago
5 0

Answer:

A search strategy is useful because it helps you learn about things that are not available to you in person. One advanced search strategy is to form words carefully. I could copy 'describe one advance search strategy and how it is useful' and put it into a search engine and get many different results that aren't helpful. But if I shorten it to 'advance search strategies' I get helpful information.

Explanation:

You might be interested in
Of the two basic methods of data entry, keyboards use keystrokes to enter data and instructions; what is the nonkeyboard method
Sergio [31]
The correct answer of the given question above would be second option: SOURCE DATA ENTRY. <span>Of the two basic methods of data entry, keyboards use keystrokes to enter data and instructions; the non keyboard method is called the source data entry.</span>
4 0
4 years ago
Which model involves the creation of data and process models during the development of an application?
guapka [62]
It seem like there are information missing on the question posted. Let me answer this question with all I know. So here is what I believe the answer is, <span>the creation model involves the creation of data and process models during the development of an application.</span>

Hope my answer would be a great help for you.    If you have more questions feel free to ask here at Brainly.
7 0
3 years ago
Read 2 more answers
Why should you evaluate trends when thinking about a career path?
Vladimir [108]

Because trends can show data in relation to what career is on the rise in terms of wages, statistics show patterns that you can observe to find the career which is becoming popular and most beneficial.  

3 0
4 years ago
Draw a project network from the following information. What activity(ies) is a burst activity? What activity(ies) is a merge act
Effectus [21]

The answer & explanation for this question is given in the attachment below.

5 0
3 years ago
Write a program that prompts the user to input two numbers—a numerator and a divisor. Your program should then divide the numera
icang [17]

Answer:

#include <stdio.h>// inclusion of header file.

int main()// definition of main function.

{

  int Quotient,divisor; // declare the two numbers for operation.

  scanf("%d %d",&Quotient,&divisor); // take the user inputs by scanf() function.

  printf("The division result of the number = %f",Quotient/divisor);

// print statement to print the division.

   return 0; // return statement.

}

Output:

  • If the user input is 10 and 9 then the output is 1.
  • If the user input is 4 and 2 then the output is 2.

Explanation:

  • Firstly there is a file inclusion which helps to understand the input and output function
  • Then we declare two variables of integer type which take a value of integer type.
  • Then there is a scanf statement which takes the input from the user. The '%d' format specifies that the value is in an integer value.
  • Then there is a print statement that gives the divisor in floating value. The division operation is written in the printf statement which is used to print the value. '%f' display the value in decimal value.
4 0
4 years ago
Other questions:
  • Siobhan is going to create a dialog box for a new application and while she has been a user of dialog boxes for a long time, she
    10·1 answer
  • Can a computer will work more efficiently if you perform disk optimization
    9·1 answer
  • Mintzberg's classification of organizational structure categorizes the knowledge-based organization where goods and services dep
    5·1 answer
  • In both direct flooding attacks and _____ the use of spoofed source addresses results in response packets being scattered across
    9·1 answer
  • Write a method that accepts a String object as an argument and returns a copy of the string with the first character of each sen
    14·1 answer
  • Complete the statement pertaining to the number of frames used by the national television system committee. The national televis
    9·1 answer
  • The router is physically located in a server room that requires an ID card to gain access. You've backed up the router configura
    8·1 answer
  • 30points!!!! Plz answer quickly
    5·2 answers
  • PLEASE HELP ME ASAP!!! Looking at the misty rain and fog (pictured above) Explain at least two defensive driving techniques you
    15·1 answer
  • WHAT ACTIONS CAUSE SPAM ON LINKEDIN?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!