1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tia_tia [17]
3 years ago
7

What is an effective technique for searching the web? Choose one.

Computers and Technology
2 answers:
kakasveta [241]3 years ago
4 0
Option B is what i would say 

if you are searching something and want a specific answer you are going to need to be specific on how you search it
zubka84 [21]3 years ago
3 0

Answer:

I agree i think it would be option B.

You might be interested in
Write the definition of a method, isReverse, whose two parameters are arrays of ints of equal size. The method returns true if a
jok3333 [9.3K]

Answer:

The following are code in the Java Programming Language.

//define boolean type function

boolean isReverse(int ar[], int b[])

{

//declare integer type variable

int x;

//set the for loop

for (x=0; x < ar.length && ar[x] == b[ar.length-1-x];  x++);

return x == ar.length;

}

Explanation:

<u>The following are the description of the code</u>.

In the above code that is written in the Java Programming Language, we define the boolean data type function that is 'is Reverse()' and pass two array integer data type arguments that is 'ar', 'b' in the then, declare integer data type variable that is 'x'. Set the for loop that the boolean type value is true or false.

5 0
3 years ago
When operating your vessel with a vhf radio, what channel must you monitor?.
Vladimir [108]

Answer: <u>Channel 16</u>. If you hear a MAYDAY call, remain silent, listen, and write down information about the boat in distress.

Hope this helps!

4 0
2 years ago
Does anyone know a NC wise owl password I can use, it's an emergency!! I can't ask my school because they are closed and I need
snow_tiger [21]
The password would be Apple 123
6 0
3 years ago
virtue by which you need to secure information by limiting computer access to authorized personnel only
Natalka [10]
I don't get what you are trying to ask...
Please explain
6 0
3 years ago
Which of the following is not a computer protocol? FTP, SMTP, ISP, or TCP
aliina [53]
ISP stands for internet service provider so that's the one
8 0
3 years ago
Read 2 more answers
Other questions:
  • Paragraph on how atms work
    15·1 answer
  • In 1997, two South Korean manufacturers of semiconductors, LG Semicon and Hyundai Electronics, were accused of selling dynamic r
    14·1 answer
  • What is the definition of a WAP?
    6·2 answers
  • Files with what two file extensions are commonly known as tarballs??
    8·1 answer
  • What time does walmart deposit paychecks?
    5·1 answer
  • Explain the use of keyboard shortcuts and key combinations. You are at the tenth page of a 20-page document. You need to make ch
    14·1 answer
  • QUESTION 56 Use the Windows ________ to check on a nonresponsive program. Backup utility Error-checking System Restore Task Mana
    6·1 answer
  • Which shape is used for input or output?
    15·1 answer
  • On which tab are the print commands in Excel 2016 accessed?
    7·2 answers
  • For which tasks is Layout view most helpful? Check all that apply.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!