1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Harlamova29_29 [7]
2 years ago
13

Explain two ways of searching information using a search engine.​

Computers and Technology
1 answer:
lozanna [386]2 years ago
5 0

answer:

navigational search queries · for example, “how to make cake?”

informational search · for example, “y-o-u-t-u-b-e” or “apple"

explanation:

  • navigational — these requests establish that the user wants to visit a specific site or find a certain vendor
  • informational — in these instances, the user is looking for certain information
You might be interested in
Plzzz help! It’s due soon and I can’t figure it out
nignag [31]

Answer:

The answer is A or the first option.

Explanation:

3 0
2 years ago
Regarding the Internet of Things (IoT), a business involved in utilities, critical infrastructure, or environmental services can
jeka94

Answer:

A. true

Explanation:

Based on the information provided within the question it can be said that the statement is completely true. This is because, traffic-monitoring applications have the main function of monitoring and analyzing the flow of traffic of one or various different items. Which can be applied to the business involving utility, infrastructure, and environmental services by monitoring the specific items regarding each business. Therefore making sure that enough product is entering or leaving each business as it is suppose to. As well as providing stock analysis and defective product alerts.

6 0
3 years ago
Which of the following protocols support the encryption and decryption of e-mail messages?
Katena32 [7]
It seems that you have missed the necessary options for us to answer this question so I had to look for it. Anyway, here is the answer. The protocol that supports the encryption and decryption of e-mail messages is this: <span>Secure Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP). Hope this helps.</span>
7 0
3 years ago
The _____ option will require users to have a password to access the document.
Zepler [3.9K]
The login option will require users to have to have a password to access the document
6 0
3 years ago
Read 2 more answers
Write a function that takes a list as a parameter, converts every element in the list to integar and then returns a tuple compri
abruzzese [7]

Answer:

Following is given the solution of your question as required.

All the necessary descriptions are given in form of comments,

Sample output are also shown.

I hope it will help you!

Explanation:

6 0
3 years ago
Other questions:
  • How do I cancel my membership or Subscription on here
    11·1 answer
  • Which statements best describe slaves in ancient times? Select all that apply.
    8·1 answer
  • What did major networks do to combat audience erosion in the 1990s?
    15·1 answer
  • /*Implement a class Address . An address has a house number, a street, an optional
    5·1 answer
  • Which devices are used in networking
    15·1 answer
  • You can use tables for layout work. However, in XHTML, each form control should have its own ______ element
    12·1 answer
  • What is the most common knowledge computer programmers need in order
    15·2 answers
  • Type the correct answer in the box. Spell all words correctly. Kenny is designing a document for the employee motivation campaig
    8·1 answer
  • Which of the following statements are TRUE about formatting images in HTML.
    13·1 answer
  • Given the following declaration, what is the value of b[ 1 ][ 0 ]? int b[ 2 ][ 2 ] = { { 1 }, { 3 , 4 } };
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!