1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
strojnjashka [21]
2 years ago
13

Three types of query​

Computers and Technology
1 answer:
Artemon [7]2 years ago
4 0

It is commonly accepted that there are three different types of search queries:

Navigational search queries.

Informational search queries.

Transactional search queries.

You might be interested in
What is the difference between an electronic notebook and electronic flash cards?
Ivenika [448]

Answer:

A) Electronic notebooks store images, videos, notes, and voice recordings in one area, while electronic flash cards are study tools with information written on both sides.

Explanation:

Just took the test

Edge 2020

7 0
3 years ago
Which technique is best suited to create technical drawings?
Tema [17]

Answer:

Mechanical pencils.

Clutch pencils.

Technical pens.

Rulers.

Compass.

Drawing boards.

Erasers.

Sharpeners.

Explanation:

'What makes a great Technical Drawing? ' Technically correct, accurate, complete, consistent and unambiguous. Check the brief (a lot – and at all stages of the drawing process).

8 0
2 years ago
Write a JavaScript statement to convert "Information Technology" to uppercase.
OLEGan [10]

Answer:

The JavaScript  statement is

var str1 =    "Information Technology";

var result = str1.toUpperCase();

Explanation:

JavaScript  is used to validate the client side it means it provide the client side validation.

Following are the function of JavaScript that converted the string into uppercase.

 function val()

{

 var str1 = "Information Technology ";

 var result = str1.toUpperCase();

}

The toUpperCase() function convert the string into uppercase in JavaScript

OUTPUT  

INFORMATION TECHNOLOGY

4 0
2 years ago
A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like t
kondor19780726 [428]

The Network Mapper (Nmap) commands that would be useful on this test network are:

  1. nmap xxx.xxx.x.x -p
  2. nmap xxx.xxx.x.x -A

<h3>What is a penetration test?</h3>

A penetration test can be defined as a cybersecurity technique that simulates a cyber attack against an end user's computer system, so as to scan, identify, test and check for exploitable vulnerabilities in the following:

  • Operating system
  • Web software
  • Host device
  • Network

This ultimately implies that, a penetration test avails an tester the ability to exploit a weakness and potential security threats on a test network as a privileged user, during vulnerability assessments of the system.

<h3>The Network Mapper (Nmap) commands.</h3>

In this scenario, the Network Mapper (Nmap) commands that would be useful on this test network are:

  1. nmap xxx.xxx.x.x -p
  2. nmap xxx.xxx.x.x -A

Read more on penetration test here: brainly.com/question/25813524

6 0
2 years ago
Write a program that reads a series of strings andprints only those strings beginning with the letter "b."
coldgirl [10]

Answer:

#include <iostream>

using namespace std;

int main()

{

char str[100][20];

int n;

cout<<"Strings you want to enter"<<endl;

cin>>n;

cout<<"enter n strings"<<endl;

for(int i=0;i<n;i++)

cin>>str[i];

for(int i=0;i<n;i++)

{

if((int)str[i][0]==98) //ascii value b is 98

cout<<str[i]<<endl;

}

return 0;

}

Explanation:

The above written code is for printing the strings which starts with the letter b.

To check if the string starts with a letter b we are checking the ascii value 98 which corresponds to b and then printing those strings.

6 0
3 years ago
Other questions:
  • Standards for all managers ethical responsibilities are covered in a company's
    7·2 answers
  • What is one course of action available in every problem solving process?
    9·2 answers
  • Which of the following statements are true about quick sort
    12·1 answer
  • FIGURE A-2—Use the information in this chart to answer Question 2.
    11·1 answer
  • An organization is assigned a Class-C network 200.120.80.0 and wants to form subnets for its threedepartments: D1 (60hosts), D2
    7·1 answer
  • One of the first signals that an organization is making progress in the development of its IR program, specifically in the devel
    6·1 answer
  • Plain text and ASCII text are the same thing. true or false
    12·1 answer
  • How is primary storage different from secondary storage? Select the TWO correct statements. The CPU can only read and write data
    12·2 answers
  • A good information that contains the facts necessary for decision makers to solve a problem is characterized by the __________.
    15·2 answers
  • Non linear editing can cause _____ where edit and re-edit and re-edit again can cause video to be less true than the original ma
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!