1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Softa [21]
2 years ago
8

What can you say about the different website that you used? do they have in common?​

Computers and Technology
1 answer:
Harrizon [31]2 years ago
8 0
They all have ads. Some have inappropriate ads while some have irrelevant ads with respect to the website your on.
You might be interested in
Usually, the same software that is used to construct and populate the database, that is, the DBMS, is also used to present ____.
anygoal [31]

Answer: Queries

Explanation: A database management system(DBMS) is a system that contains the data/information in the form of content or tables.There is a software that can populate the system by the excess data usually found in the SQL format

A query is the demand for the extraction of the information that is present in the database table or content.It helps in presenting extracted data in the readable data.The most commonly used language for the queries is the SQL (structured query language) queries.Thus, the correct option is queries.

3 0
2 years ago
Phil wants to add a new video card, and he is sure the power supply is sufficient to run the new video card. But when he tries t
pshichka [43]

Answer:

Using a SATA to a 6 pin PCI-E adapter.

Explanation:

sometimes you may feel the need to make some upgrades to your computer, video cards are options where an upgrade is made, a 6 Pin PCI-E adapter is 6 pins 12V power adapter used to power a video card where their slots cannot provide them with enough power they require. in a situation where the card requires a lot of power than the slot can provide, 6 pins PCI-E adapter is a very good option.

4 0
3 years ago
Windows organises information on computer using a
lana66690 [7]
B folder
hope i helped
8 0
2 years ago
Read 2 more answers
An intruder can wreak havoc on a network by simply plugging in an infected USB flash drive.
Bas_tet [7]

Answer:

A. True

Explanation:

1. I took the test

2. Flash drive ports are connected to the rest of the computer, so putting in an infected flash drive into the port will cause the bug to spread throughout the whole device.

3 0
2 years ago
A colleague has included you on an email that is irrelevant to you, but it continues to come to your inbox because people are us
Law Incorporation [45]

on google there is a mute function with the 3 dots on the top and outlook has it in the same location but under the word of "ignore"

7 0
2 years ago
Other questions:
  • You have found statistics on the Internet that you would like to use in your speech.
    6·1 answer
  • The _____ establishes that the destination device is present on the network, verifies active service, and informs the destinatio
    13·1 answer
  • Which of the following should be considered when conducting an audience analysis ?
    13·2 answers
  • The __________ is a visual or textual storyboard that will assist in determining the type of web pages on your site.
    14·1 answer
  • Write a program that generates a random number between 5 and 15 and asks the user to guess what the number is. If the user’s gue
    5·1 answer
  • ___ is an example of a function prototype.
    12·1 answer
  • Gn guys have an Amazing day!
    12·2 answers
  • PLEASE HELP ASAP!! Timed test!!
    12·1 answer
  • How is binary used in pixels and in sound?
    5·2 answers
  • a central issue in the microsoft antitrust lawsuit involved microsoft's integration of its internet browser into its windows ope
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!