1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astraxan [27]
3 years ago
5

Why are prepositions, conjunctions, and pronouns usually considered poor choices to use as key words?

Computers and Technology
2 answers:
Katarina [22]3 years ago
6 0

Answer:

Most web pages contain these words.

Explanation:

i just took the test and got it right

nlexa [21]3 years ago
5 0
I would say URL's only use nouns in adresses


You might be interested in
What is the purpose of an arraignment?
IgorC [24]

Answer:

At an arraignment, the court officially illuminates a litigant regarding charges contained in a prosecution or data, gives the respondent a duplicate of the charging instrument, and takes the litigant's response to those charges as a request.

Explanation:

5 0
3 years ago
Read 2 more answers
What is a ribbon in word
nika2105 [10]
A ribbon is somehing ou earn
7 0
3 years ago
Read 2 more answers
2. What does the Action tool allow you to do in Microsoft PowerPoint? (20 points)
creativ13 [48]
B. Add actions

A. a presentation without a clear beginign middle and end

A. add action between slides
7 0
3 years ago
Read 2 more answers
What type of attacks take advantage of vulnerabilities in poorly coded web application software to introduce malicious program c
Yakvenalex [24]

Answer:

SQL Injection

Explanation:

Coding a web application that uses a database is requiring close attention, where the developer closes any loophole any attacker may later want to exploit when the application is deployed. SQL Injection is a type of attack where the attacker places malicious code in the query statements through the form. This is possible if the input is not properly sanitized and cleaned.

5 0
3 years ago
Which types of networks cover large geographical areas such as several states? PAN
aleksley [76]

MAN

Explanation:

Metropolitan Area Network

Local Area Network

Wide area Network

7 0
3 years ago
Other questions:
  • EXPLAINING A URL
    15·1 answer
  • Which of the following is NOT one of the most important elements when designing a website?
    8·2 answers
  • A(n ____ is anything about which data are to be collected and stored.
    8·1 answer
  • write the cell address for the following 1. First row and first column 2.First column and last row. 3. 10th column and 19th row.
    5·1 answer
  • One lap around a standard high-school running track is exactly 0.25 miles. Write a program that takes a number of miles as input
    12·1 answer
  • Your computer system is a participant in an asymmetric cryptography system. You've crafted a message to be sent to another user.
    13·1 answer
  • A label control may be added to a form by double-clicking on the Label control icon in the ________ window.
    15·1 answer
  • Role of memory in a computer system
    10·1 answer
  • When hacking a website to test a secure connection and ensure internet safety, what is a good way to check the coding of the web
    14·1 answer
  • 16. A/An __________ is operated on the principle that the dying have special needs and wants that hospital personnel are too bus
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!