1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astraxan [27]
3 years ago
5

Why are prepositions, conjunctions, and pronouns usually considered poor choices to use as key words?

Computers and Technology
2 answers:
Katarina [22]3 years ago
6 0

Answer:

Most web pages contain these words.

Explanation:

i just took the test and got it right

nlexa [21]3 years ago
5 0
I would say URL's only use nouns in adresses


You might be interested in
Ideally, Internet of Things (IoT) devices have the ability to:
Stella [2.4K]

Answer:

I believe the answer would be D

8 0
2 years ago
An intruder with malicious intent breaks into an office and steals a hard drive
Leya [2.2K]

Based on the above, the type of security is illustrated in this example is known as data security.

<h3>What is Data security?</h3>

This is known to be the act of keeping safe data from unauthorized access and its corruption in all of its lifecycle.

Note that in the case above, the intruder is interested in the companies data and as such,  the type of security is illustrated in this example is known as data security.

Learn more about  security from

brainly.com/question/15668437

#SPJ1

6 0
2 years ago
A collection of a set of instrument that solve a problem is called .....​
Maru [420]

Answer:

Internet

Explanation:

A collection of a set of instrument that solve a problem is called the internet.

The Internet is an enormous networking infrastructure that uses the Internet protocol suite (TCP/IP). It connects millions of computers together globally, forming a network in which computers can communicate with each other provided that they are both connected to the Internet.

The Internet contains billions of web pages and resources created by software engineers from around the world, making it a limitless place to locate information and solve peculiar problems.

3 0
3 years ago
Read 2 more answers
Protecting a sheet means ?
larisa86 [58]

To prevent other users from accidentally or deliberately changing, moving, or deleting data in a worksheet, you can lock the cells on your Excel worksheet and then protect the sheet with a password.

8 0
2 years ago
In the application development area, ____________ often refers to bringing together various sources of data to create a new prod
Vinvika [58]

Answer:

mashup

Explanation:

In the application development area, mashup often refers to bringing together various sources of data to create a new product with unique value.

8 0
2 years ago
Other questions:
  • suppose you need to verify how to correctly use commas. you pen your English textbook and scan the chapter titles in which one w
    15·1 answer
  • What protocol must be supported by routers in order to utilize remote assistance easy connect?
    10·1 answer
  • What type of traffic always goes to all devices in a subnet?
    10·1 answer
  • Why does a satellite requires two bridges?
    11·1 answer
  • All resources are limited. Which of the following is NOT a resource?
    11·1 answer
  • what is it called when someone uses software to run multiple operating systems on one computer at the same time? A.functional vi
    9·1 answer
  • Consider the most important item among all the categories of information stored on your personal computer. As it applies to that
    8·1 answer
  • Guess The Song: <br> What Popping Brand New Whip Just Hopped In, I Got options
    15·1 answer
  • What is a computer modem?​
    9·1 answer
  • Hãy mô tả mô hình xử lý của hệ thống thông <br> tin kế toán tài chính trong một doanh nghiệp
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!