1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ad-work [718]
2 years ago
7

8

Computers and Technology
1 answer:
EleoNora [17]2 years ago
8 0

Answer:

yes you are correct

the AND operator narrows

the OR operator broadens your search results

You might be interested in
________is one of the most popular payment gateways founded in in December 1998​
iren2701 [21]

paypel is the most popular

6 0
3 years ago
Materials such as copper, silver, and aluminum through which electric energy passes freely are called
nasty-shy [4]
These materials are called conductors
6 0
4 years ago
Which technology can be used as a defense against dos and ddos syn flood attacks?
Montano1993 [528]
In terms of websites, there's a service called cloud flare which can prevent DDOS attacks in websites. Other applications you would have to look up. Hopefully this helps!
6 0
4 years ago
Which of the following need to be assessed during unit testing?
diamong [38]
E) both C and D Erro handling and execution paths
8 0
3 years ago
Terminal emulation, especially the unprotected ____________________ protocol, should be blocked from any access to all internal
storchak [24]

Answer:

telnet

Explanation:

<h2><u>Fill in the blanks </u></h2>

Terminal emulation, especially the unprotected <u>telnet </u>protocol, should be blocked from any access to all internal servers from the public network.

3 0
3 years ago
Other questions:
  • The _________ contains frequently used formatting commands that are displayed when selecting text or objects with the mouse.
    7·1 answer
  • In gaming, "rendering" refers to:
    12·2 answers
  • Question 1 Multiple Choice Worth 5 points)
    10·1 answer
  • Programming challenge description: Write a program that, given two binary numbers represented as strings, prints their sum in bi
    6·1 answer
  • • In your response, please include some examples of the three different types of storage.
    11·2 answers
  • A program is run line by line to determine the source of a logic error. Which best describes the specific tool being used?
    11·2 answers
  • 1. Fill in the blanks:
    7·1 answer
  • True and False(Total points: 10)
    12·2 answers
  • If you do a Find and Replace for a term, where will Word begin looking for the term?
    6·1 answer
  • In a relational database application, a(n) ________ key is used to link one table with another.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!