1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
weeeeeb [17]
2 years ago
9

Which of the following is NOT a function of a Web Browser?

Computers and Technology
1 answer:
sweet [91]2 years ago
3 0

A web browser is used to gain access to the contents of a website, displaying the information in a readable and easily understandable format. Hence, an option which isn't a function of a web browser is <em>Crawl through the World Wide Web searching for words and terms to index in Web Databases</em>

  • A web browsers allows users to access web pages and sites, by accessing web servers and requesting access to display the contents.

  • Web pages are written in <em>Hypertext</em><em> </em><em>Markup</em><em> </em><em>Language</em><em> </em><em>(</em><em>HTML</em><em>)</em><em>.</em><em> </em>Browsers interpret these document format and tags so that it is displayed in an understandable format.

Learn more : brainly.com/question/17130932

You might be interested in
when using presentation software, which menu can you use to duplicate a slide to use as a template for a new slide?
miskamm [114]


<span>Open two presentations.<span><span>original presentation - contains the slides to copy from</span><span>destination presentation - slides will be copied to this presentation - (this may be an existing presentation or a new presentation)
 <span><span>For PowerPoint 2007 - On the View tab of the ribbon, in the Window section, click on the Arrange All button.</span><span> - Choose Window > Arrange All from the main menu.</span></span></span></span>This will show both presentations at the same time on screen.

</span><span><span>For all versions of PowerPoint, choose one of the following methods to copy your slides ~<span><span>Copy and Paste<span><span>Right click on the thumbnail slide to be copied, in the Slides/Outline task pane of the original presentation.</span><span>Choose Copy from the shortcut menu.</span>In the destination presentation, right click in a blank area of the Slides/Outline task pane, where you wish to place the copied slide. This can be anywhere in the sequence of slides in the
presentation.<span>Choose Paste from the shortcut menu.</span></span></span><span>Click and Drag<span>In the Slides/Outline task pane of the original presentation, click on the thumbnail version of the desired slide.<span>Drag the thumbnail slide to the Slides/Outline task pane of the destination presentation in the preferred location for the slide.</span></span></span></span></span><span>The newly copied slide will take on the design theme or design template of the second presentation. If you have started a new presentation and have not applied a design theme or design template, the newly copied slide will be on the white background of the default design template.</span></span>
6 0
3 years ago
Ned and Mary Ann are saving their files to a CD. When prompted, Ned will click on Burn file to disk, indicate the recording spee
r-ruslan [8.4K]

Answer:

Should be Ned.

5 0
3 years ago
Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
Andrew [12]

<u>Man-in-the-middle attack</u> refers to a type of an attack in which an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers.

<u>Explanation:</u>

A man-in-the-middle attack (MITM) is an assault where the aggressor furtively transfers and potentially changes the correspondences between two gatherings who accept that they are straightforwardly speaking with one another. This happens when the assailant catches a segment of a correspondence between two gatherings and retransmits it sometime in the future. The assailant would then be able to screen and perhaps change the substance of messages. The utilization of such encoded burrows makes extra secure layers when you get to your organization's secret systems over connections like Wi-Fi.

8 0
3 years ago
Calculate the maximal size of a file if we have:
ollegr [7]

Answer:

4 GB

Explanation:

<u>Determine the maximal size of a file </u>

100 direct block address

= 100 * 1024 = 102400

One single indirect block address

= 128 * 1024 = 131072

One double indirect block address

= 128 * 128 * 1024 = 16777216

one triple indirect block address

=  128 * 128 * 128 * 1024 = 2147483648

one quadruple indirect block addresses

=  128 * 128 * 128 * 128 * 1024 = 274877906944

maximal size of the file

= ∑ 102400 +  131072 + 16777216 + 2147483648 + 274877906944

= 4GB

7 0
3 years ago
What are some of the benefits of project
galina1969 [7]

Answer:

The project is more likely to be finished on  time.

Tasks can be done more efficiently.

Explanation:

Project management refers to the process involved in the management and accomplishment of the project. It includes the process, techniques, and guidance to carry on to complete a project. Project management helps in achieving the desired outcomes of the project. The efficient use of the resources and the proper management of the skills are ensured in project management. Better communication and an increase in satisfaction help in improving productivity.

4 0
3 years ago
Other questions:
  • Amy has decided to use a dark background and light colored text for her prensentation. Which toolbar option will let her change
    5·1 answer
  • Consists of a drive letter (preceded by a drive name when necessary) and colon, to identify the storage device, and one or more
    5·1 answer
  • When you start to type =av, what feature displays a list of functions and defined names?
    11·1 answer
  • When he takes a picture, Simon freezes an action without blurring it, to show movement. Which type of photographer is he?
    9·2 answers
  • Importance of Computer in the world​
    12·2 answers
  • End user needs assessment is a formal procedure to analyze a user's computer needs; it involves a specific set of steps that are
    8·1 answer
  • For C++ ONLY please,
    14·1 answer
  • The steps.txt file contains the number of steps a person has taken each day for a year. There are 365 lines in the file, and eac
    12·1 answer
  • Braxton is writing a program to design t-shirts. Which of the following correctly sets an attribute for color?
    7·1 answer
  • Please I need help.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!