1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksano4ka [1.4K]
3 years ago
10

What are specific and relevant terms that will help you locate information using an internet search engine?

Computers and Technology
1 answer:
Liono4ka [1.6K]3 years ago
3 0
I would say A:keywords

Hope this helps

I’m sorry if this is wrong

Have a great day/night
You might be interested in
What is a narrative?
vichka [17]

Answer:

It's B the event that happened in a story

Explanation:

Narrative - a spoken or wirriten account of connections events, a story

3 0
3 years ago
Read 2 more answers
___signs tell you what you can or can't do, and what you must do ?
Harrizon [31]

Answer:

Warning signs tell you can or can't do, and what you must do?

5 0
4 years ago
Read 2 more answers
Which bitwise operation has the same effect as multiplying a by 16?
Shalnov [3]
<span>Jun 15, 2011 - Multiplication and division can be achieved using bit operators, for example .... I discovered pretty much the same thing for Sun CC close to 20 years ago. ... Just to add a rough estimation: On a typical 16-Bit processor ..... Doing it yourself willaffect readability and possibly have no effect on performance.</span><span>
</span>
4 0
3 years ago
Read 2 more answers
A new company is upgrading a media workstation. The computer will be predominantly used for graphic intensive presentations, sli
Lilit [14]

Answer:

The answer is letter A

Explanation:

High-end video, high-end audio, multicore processor

4 0
3 years ago
How many keys are utilized in symmetric cryptography?A. OneB. TwoC. ThreeD. Four
eimsori [14]

Answer:

A. One

Explanation:

Symmetric key cryptography makes use of one key. The same key is used for both encryption and decryption. This is different from asymmetric cryptography where separate keys are used for the two operations. Some examples of symmetric cryptography include:

  • Advanced Encryption Standard (AES)
  • Data Encryption Standard (DES)
  • Triple Data Encryption Standard (3DES)
  • Blowfish
7 0
3 years ago
Other questions:
  • When a class declares an entire class as its friend, the friendship status is reciprocal. That is, each class's member functions
    14·1 answer
  • An enterprise DBMS is automatically capable of serving as a mobile DBMS. There are no special issues raised by mobility. True Fa
    11·1 answer
  • The distance at which wi-fi signals can travel ranges typically between ____ and ____.
    15·1 answer
  • An algorithmic function that takes an input message of arbitrary length and returns an output of fixed-length is called a(n) ___
    10·1 answer
  • What is the purpose of the print area feature​
    11·1 answer
  • (The Location class) Design a class named Location for locating a maximal value and its location in a two-dimensional array. The
    10·1 answer
  • "The study of how changes in the input parameters of a linear programming problem affect the optimal solution is known as
    8·1 answer
  • What is considered to be the core of the Unix operating system ?
    14·1 answer
  • Why do ineed to upgrade to see answers isnt it enough adds
    15·2 answers
  • How does our behavior change when we know we're being watched?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!