Which of the following is not an advanced strategy you may use to help you conduct a search on the Internet?


using a wild card in your search

doing a Boolean search

trying a different search engine

entering keywords into a Web crawler

Answers

Answer 1

Answer:

Entering keywords into a Web crawler

Explanation:

A web crawler, also known as a spider or a bot, is a program that systematically browses the web and indexes information for search engines. It is not a strategy for conducting a search on the internet.

On the other hand, using a wild card in your search, doing a Boolean search, and trying a different search engine are advanced strategies that you can use to refine your search results and find the information you need more effectively.


Related Questions

The average of 90 80 and 40 is 70. How can I code this to make it userfriendly as well?

The average of 90 80 and 40 is 70. How can I code this to make it userfriendly as well?

Answers

Lets use python

\(\tt a=90\)

\(\tt b=80\)

\(\tt c=40\)

\(\tt Q=(a+b+c)/3\)

\(\tt print("The\:Average=",Q)\)

How to check if a number is negative from user in assembly language?

Answers

In assembly language, to check if a number is negative or not, we can use the signed arithmetic instructions. The most common way to do this is by using the CMP instruction to compare the number with zero. Here is an example code snippet to check if a number is negative or not:

;assume that the number is stored in register A CMP #$00    ;compare A with zero BMI negative    ;branch if A is negative ;continue with the positive case;...negative:;code for the negative case;...The CMP instruction sets the processor status flags based on the result of the comparison. In this case, if the number in A is negative, the negative flag (N) will be set, and the branch if minus (BMI) instruction will transfer control to the negative label. If the number is positive or zero, the negative flag will be clear, and the program will continue with the positive case. that this code assumes that the number is signed and stored in two's complement format. If the number is unsigned, you can simply check the carry flag (C) after a subtraction from zero instead of using CMP instruction.

To learn more about arithmetic click the link below:

brainly.com/question/13261821

#SPJ4

How does different mobile application affects the life of every individual? Explain your answer in 3-5 sentence.​

Answers

Answer:

New technologies available with cellular devices and the introduction of smartphones have become a large part of individual’s lives in the past few decades.  Smartphones have the ability to perform almost every operation necessary for individuals at any time or place. Smartphones are means for individuals to communicate quickly while interacting on other websites and social networking platforms at the same time.  Each day the capabilities of smartphones continue to grow and allow users to establish more information through these mediums, without the extra work of using other devices and programs.  The individuals in the 18-30 age range are the ones most affected in their social interactions because of the reliance on smartphones. These younger individuals use the smartphones as their main form of communication.

Where can the required arguments for a function be found? In the function keyword list. In the function's return list. In the function header In the module docstring.

Answers

The required arguments for a function can be found in the function header.

A function header includes the function name, followed by parentheses containing any required arguments (also known as parameters). These arguments are the input values that the function needs to perform its task. When you call the function, you need to provide the appropriate values for these arguments in order for the function to work correctly.

The function keyword list, return list, and module docstring do not provide information about the required arguments for a function.

To know more about function header visit:

https://brainly.com/question/30452809

#SPJ11

Choose the correct numbers in order to have the following output.

3 1
3 2
4 1
4 2

for numx in [3, _]: (4 or 2)
for numy in [1, _]: (4 or 2)
print (numx, numy)​

Answers

To have the desired output, the correct numbers to fill the blanks are as follows:

for numx in [3, 2]:

for numy in [1, 2]:

print (numx, numy)

Explanation:

The first line iterates over the values 3 and 2. Choosing 4 would break the pattern and not produce the desired output.

Similarly, the second line iterates over the values 1 and 2. Choosing 4 would again break the pattern and not produce the desired output.

The print statement simply outputs the current values of numx and numy, resulting in the desired output of:

3 1

3 2

4 1

4 2

Learn more about produce the desired output here:

https://brainly.com/question/32248151

#SPJ11

sometimes groups of data packets are sent together in a package called a:

Answers

Explanation:

On client/server networks, more users can be added without affecting the performance of other nodes. This is known as network

The groups of data packets are sent together in a package called a frame.

What is Data?

Data are discrete values that transmit information, such as amount, quality, fact, statistics, or other basic units of meaning, or just sequences of symbols that may be interpreted further. A datum is a single value inside a set of data.

A frame is defined as "the transmission unit of a link layer protocol, consisting of a link layer provided in order by a packet." An interframe gap separates each frame from the next. A frame is a collection of bits that includes frame synchronization bits, the package content, and a frame check sequence.

A frame carries more data about the message being conveyed than a packet. There are two sorts of frames in networking: fixed-length frames and variable-length frames.

Learn more about data here:

https://brainly.com/question/10980404

#SPJ2

the emergence of the internet has decreased the threats to information security

Answers

The internet has brought advancements in information security, reducing certain threats, but vigilance and adopting latest security measures remain crucial.

The internet has indeed brought about advancements in information security, reducing certain threats. Encryption technologies, like Secure Socket Layer (SSL) and Transport Layer Security (TLS), have become widespread, protecting data during transmission.

Additionally, firewalls and intrusion detection systems have become more sophisticated, safeguarding networks from unauthorized access. The rise of cloud computing has also contributed to improved security, with data being stored in highly secure data centers.

However, it's important to note that the internet has also introduced new threats, like phishing and malware attacks. Therefore, while the internet has brought advancements in information security, it's crucial to stay vigilant and adopt the latest security measures to ensure the safety of our data.

To learn more about information and security visit:

https://brainly.com/question/29796699

#SPJ4

The complete question is:

Give explanation about the emergence of the internet has decreased the threats to information security.

A constructor must have a return statement.

True

False

Answers

Answer:

False

Explanation:

this is false not true

Where does the revolver get the IP address of a site not visited before?

the file server

the name server

the IP provider

the print spooler

Answers

Answer: The name server

Explanation:

Nameservers are part of a large database called the Domain Name System (DNS), which acts like a directory for devices and the IP addresses attached to them. What nameservers do is use this information to translate domain names into numerical IP addresses – the language our computers understand

Where are 'if' and 'else' statements shown when printing a document in a word processor?

Answer the question and then your task is to:

Write an algorithm or sequence of instructions that include the IF statement for the document being printed.

Answers

Explanation:

cpt price

When working with Sendmail, what command can be used to test SMTP support?

Answers

Answer:

"HELO" would be the correct choice.

Explanation:

SMTP seems to be the protocol for transferring emails through one messaging service toward the next. HELO seems to be an SMTP command transmitted by someone with an email server that recognizes yourself when you communicate to some other email server to begin the mail transmitting procedure. It is accompanied either by a domain name including its email address that is sent.

Answer:

HELO/EHLO.

Explanation:

Simple Mail Transfer Protocol (SMTP) is a protocol followed while sending an electronic mail or receiving it. It is a TCP/IP protocol (a protocol used to interconnect in communication protocols).

To test Simple Mail Transfer Protocol (SMTP), the HELO/EHLO command is used. There are several other commands in SMTP, which is used to communicate properly.

The HELO command is a type of command in SMTP which is used to test or initiate SMTP communication. HELO/EHLO are the commands which are used to test SMTP communication. They are used interchangebaly.

Thus the correct answer is HELO/EHLO command is used to test SMTP support.

Unit Test
Unit Test Active
11
12
TIME REN
16:
Which formatting elements can be included in a style Terry created?
font size, type and color
paragraph shading
line and paragraph spacing
All of the options listed above can be used to create a new style.

Answers

Answer:

d. all of the options listed above can be used to create a new style .

Explanation:

The formatting elements that can be included in a style Terry created is font size, type and color. The correct option is A.

What is formatting element?

The impression or presentation of the paper is renowned to as formatting. The layout is another word for formatting.

Most papers encompass at least four types of text: headings, regular paragraphs, quotation marks, as well as bibliographic references. Footnotes along with endnotes are also aggregable.

Document formatting is recognized to how a document is laid out on the page, how it looks, and the way it is visually organized.

It addresses issues such as font selection, font size as well as presentation like bold or italics, spacing, margins, alignment, columns, indentation, and lists.

Text formatting is a characteristic in word processors that allows people to change the appearance of a text, such as its size and color.

Most apps display these formatting options in the top toolbar and walk you through the same steps.

Thus, the correct option is A.

For more details regarding formatting element, visit:

https://brainly.com/question/8908228

#SPJ5

who is he can anyone help me​

who is he can anyone help me

Answers

This person is Elon Musk, the owner of Tesla :)
The person in the photo is Elon Musk. He’s the CEO of SpaceX and CEO and product architect of Tesla, Inc.,founder of The Boring Company, co-founder of Neuralink, and co-founder and initial co-chairman of OpenAI.

ARGENT !!20 POINTS
А ________ translates commands from a computer to draw lines on paper.

Answers

Answer:

dye-sublimation printer.

Explanation:

Answer:

Printer

Explanation:

a repeater is just an amplifier. group of answer choices true false

Answers

False.  While a repeater and an amplifier both boost signals, they serve different purposes. An amplifier simply amplifies the signal, increasing its strength to compensate for signal losses over a transmission line or due to attenuation. It does not process the signal in any other way.

On the other hand, a repeater regenerates and retransmits a signal, essentially acting as a "signal regenerator." It receives a weak or degraded signal, processes it to remove noise and distortion, and retransmits it with sufficient strength to overcome losses over the transmission line. Repeaters are often used in long-distance communication systems to extend the range of signals and improve their quality. They can also be used to relay signals between different transmission media, such as from copper wire to fiber optic cable. Therefore, while both devices may increase signal strength, they serve different purposes in communication systems.

Learn more about repeater here;

https://brainly.com/question/29774842

#SPJ11

False. A repeater is not just an amplifier, although it does have an amplification function. A repeater is a device that is used to regenerate and extend the signals of a network, such as a wireless or wired network.

While an amplifier simply amplifies a signal, a repeater not only amplifies the signal but also regenerates it so that it can be transmitted over a greater distance. This is because as a signal travels along a transmission line, it tends to weaken and lose quality, which can result in a loss of data or signal strength. A repeater is designed to detect and regenerate this weakened signal so that it can be transmitted further without losing quality or data.

Repeaters can be used in various types of networks, such as cellular networks, Wi-Fi networks, or wired networks, to extend the range of the network and improve its overall performance. Repeaters are particularly useful in large buildings or areas where the signal strength is weak due to distance or obstructions.

Learn more about Wi-Fi here:

https://brainly.com/question/30867289

#SPJ11

This dialogue reflects what aspect of communication?

a.

body language

b.

good listening

c.

working together

d.

leadership


Please select the best answer from the choices provided


A
B
C
D

Answers

Answer:

B.

Explanation:

At the time of creation of cui material the authorized is responsible for determining.

Answers

The authorized holder of a document or material is responsible for determining, at the time of creation, whether information in a document or material falls into a CUI category. If so, the authorized holder is responsible for applying CUI markings and dissemination instructions accordingly

Ravi is writing an essay on the impact of the internet on business. Help him classify the scenarios he sees around him as positive and negative effects of the internet on business. He recently bought a second-hand camera online, which he hadn't been able to find in any store. A bookstore down the road shut down because people preferred the cheaper online bookstores. Ravi's sister complains that her boss always knows when she is late, but rarely greets her if their paths cross in office. His friend sells printed T-shirts online, storing them in his basement and promoting them on social media. One of his friend's printed T-shirts got wet and stained in the delivery truck and the buyer wrote a nasty review.

Answers

Answer: See explanation

Explanation:

Based on the options given, the positive effects of the internet on business will be:

• He recently bought a second-hand camera online, which he hadn't been able to find in any store.

• His friend sell printed T-shirts online, storing them in his basement and promoting them on social media.

The negative effects of the internet on business will be:

• A bookstore down the road shut down because people preferred the cheaper online bookstores.

• Ravi's sister complains that her boss always knows when she is late, but rarely greets her if their paths cross in office.

• One of his friend's printed T-shirts got wet and stained in the delivery truck and the buyer wrote a nasty review.

Which quality of an image are megapixels related to?
color saturation
O resolution
O perspective
O depth of field

Answers

Answer:

Megapixels are related to the resolution.

Which of the following statements is true about scalability? Choose 3 options.

1. Scalability refers to the ability of hardware components to increase their capacity.

2. The cloud offers services to automatically scale your system and balance the workload between components.

3. An example of vertical scaling is adding a new server to the network.

4. Scalability should be considered very early in the project.

5. Horizontal scaling has fewer limits than vertical scaling.

Answers

Answer:

4, 5, 2

Explanation:

just did it on edge :)

True statements about the scalability are the options 2, 4, and 5 in the given question that says that

the clouds provide resources to scale the system and balance the workload between components on its own, and it should be considered at the beginning of the project. Horizontal scaling has fewer limits than vertical scaling.

Scalability is the ability of a system in which every component of hardware or software can be expanded quickly and easily to handle the increased workload.

Scalability helps in adapting the change to continue to perform well even there is a change in size or volume in order to meet a user or business requirement.

Vertical scaling is limited as it can increase as per the size of the particular server whereas horizontal scaling has the ability to scale wider.

Learn more about the scalable network:

https://brainly.com/question/8752830

Which of the following statements is true about scalability? Choose 3 options. 1. Scalability refers

Use a Linux command to create a directory called temp. Copy-paste the command you used: Question 9 Use a Linux command to rename the temp directory to newtemp. Copy-paste the command you used: Question 10 Use a Linux command to delete the newtemp directory. Copy-paste the command you used:

Answers

To create a directory called temp:  mkdir temp is used, To rename the temp directory to newtemp: mv temp newtemp is used, To delete the newtemp directory: rm -r newtemp is used.

To create a directory called "temp" in Linux, you can use the mkdir command. Here's the command you can copy and paste:

mkdir temp

mkdir is a command used in Linux to create a new directory.In this case, we provide the argument temp after the mkdir command, which specifies the name of the directory we want to create.When you run this command, Linux will create a new directory named "temp" in the current location, which is typically the directory you are currently in when executing the command.

9:

To rename the "temp" directory to "newtemp," you can use the following command:

mv temp newtemp

The mv command in Linux is used to move or rename files and directories.In this case, we provide the source directory name (temp) as the first argument, and the destination directory name (newtemp) as the second argument.When you run this command, Linux will rename the directory "temp" to "newtemp" in the same location.If there are any files or subdirectories within the "temp" directory, they will also be moved to the renamed directory.

10:

To delete the "newtemp" directory, you can use the following command:

rm -r newtemp

The rm command in Linux is used to remove (delete) files and directories.In this case, we provide the argument -r to the rm command, which stands for "recursive."The -r option allows the command to delete directories and their contents recursively.We also provide the directory name (newtemp) as the argument to specify the directory we want to delete.When you run this command, Linux will delete the "newtemp" directory and all its contents, including files and subdirectories.

To learn mort about command: https://brainly.com/question/13615023

#SPJ11

if someone could answer b) ii) , that would be great :) (no need to answer the rest, i’ve got it covered)

if someone could answer b) ii) , that would be great :) (no need to answer the rest, ive got it covered)

Answers

Answer:

Stating "Refuel a car" describes the behavior of what should happen without getting into the technical details. Abstraction allows us to know what something should do without worrying about how exactly it accomplishes it.

Write an expression that evaluates to true if the value of the int variable widthOfBox is not divisible by the value of the int variable widthOfBook. Assume that widthOfBook is not zero. ("Not divisible" means has a remainder.)

Answers

Answer:

The expression is:

if widthOfBox % widthOfBook != 0

Explanation:

Given

Variables:

(1) widthOfBox and

(2) widthOfBook

Required

Statement that checks if (1) is divisible by (2)

To do this, we make use of the modulo operator. This checks if (1) is divisible by 2

If the result of the operation is 0, then (1) can be divided by (2)

Else, (1) can not be divided by (2)

From the question, we need the statement to be true if the numbers are not divisible.

So, we make use of the not equal to operator alongside the modulo operator

The ______is the first part of a packet that contains the source and destination addresses. Select your answer, then click Done.

Answers

The first part of a data packet that comprises the source and destination addresses of a network is called a: header.

In Computer networking, the transmission control protocol/Internet protocol (TCP/IP) model refers to a standard networking protocol that allows network devices and host computers to interconnect and communicate with one another over a network, especially through the transmission of data packets and an Internet protocol (IP) address.

Generally, an IP address is typically designed and developed to hold information about data packets. Thus, a header is the information at the beginning of a data packet that comprises the source and destination addresses of a network.

In conclusion, a header is the first part of a data packet that comprises the source and destination addresses of a network.

Read more on header here: https://brainly.com/question/20629962

agnes wants to make sure she knows which steps to take to avoid spillage. you advise agnes to do all of the following except: a. check all emails for possible classified information. b. store classified data on her smart phone when traveling.

Answers

You are correct. You should advise Agnes not to store classified data on her smartphone when traveling as this could put the data at risk of being leaked or stolen.

Instead, Agnes should use a secure cloud storage service or a secure USB drive to store any confidential or sensitive data. Additionally, Agnes should make sure to use strong passwords to protect her accounts and use two-factor authentication whenever possible.

Finally, Agnes should keep an eye out for suspicious activity on her device and be sure to report any suspicious activity to her IT team or security team.

Learn more about advise Agnes

https://brainly.com/question/3435965

#SPJ4

the fact that everyone is a publisher means: a. all of these are correct. b. hiring a programmer to create a website is no longer necessary. c. there is content clutter. d. users can create and interact with the content they see. e. strong coding knowledge is no longer necessary to create a website.

Answers

Answer is option a) All of these are correct

Web Development :

  While everyone was manually coding their sites in the early days of the internet, many websites are now built with a content management system (CMS). A CMS removes the need to code by offering a visual interface to build web pages and structure your site.

         The website developer is a web development specialist. A professional website developer's web solution will be more technically complex and advanced than the website you build. They can have any sophisticated features you want. Front-end developers have more experience developing tools that improve the user experience. If you have a design concept that must work across multiple browsers and computers, you should hire a front-end developer. Back-end developers are essentially computer programmers who specialise in the development of Web applications. They are capable of developing content management systems, security features, and data management tools.

           Web programmers, also known as web developers or web engineers, create web-based applications. Their work focuses on non-design aspects of web development, such as coding and markup. Coding is the process of writing software, whereas markup is the process of organising and formatting text. The web programmer receives user requests for a specific web application, converts the request into coding, and creates a working online application. Web designers typically lack experience with computer programming. They may understand the fundamentals of HTML, CSS, and other common tools, but they are not the people you want to hire to build a website.

To learn more web development refer:

https://brainly.com/question/25941596

#SPJ4

you are designing an ai application that uses images to detect cracks in car windshields and warn drivers when a windshield should be repaired or replaced. what ai workload is described?

Answers

The AI workload described is image classification and anomaly detection.

The AI workload described in the given question involves two key tasks: image classification and anomaly detection. Firstly, the AI application needs to classify images to determine whether a car windshield has cracks or not. This is done through image classification algorithms that analyze the visual features of the images and classify them as either cracked or intact windshields.

Secondly, the application also needs to perform anomaly detection to identify when a windshield should be repaired or replaced. This involves analyzing the severity and extent of the cracks detected in the images and comparing them to predefined criteria. Based on this analysis, the AI application can determine whether the cracks are within acceptable limits or if they pose a risk to the driver's safety, requiring repair or replacement.

By combining image classification and anomaly detection techniques, the AI application can accurately detect cracks in car windshields and provide timely warnings to drivers. This can help prevent potential accidents and ensure the maintenance of safe driving conditions.

Learn more about workload

brainly.com/question/30090258

#SPJ11

define the proposition in symbols using: p: the weather is bad. q: the trip is cancelled. r: the trip is delayed. proposition in words: if the weather is good, then the trip will not be delayed. pro

Answers

The symbolic representation is ¬p → ¬r, which means "If not p (the weather is good), then not r (the trip will not be delayed)."

What is the symbolic representation of the proposition "If the weather is good, then the trip will not be delayed" using the given terms?

To define the proposition in symbols using the given terms, first let's assign the symbols:

p: The weather is bad.
q: The trip is cancelled.
r: The trip is delayed.

Now, let's rewrite the proposition in words: "If the weather is good, then the trip will not be delayed." To represent this in symbols, we can use the following:

¬p → ¬r

This means "If not p (the weather is good), then not r (the trip will not be delayed)." This is the symbolic representation of the given proposition using the terms provided.

Learn more about symbolic representation

brainly.com/question/13926776

#SPJ11

having a legitimate reason for approaching someone to ask for sensitive information is called what?

Answers

It’s called Impersonation

IPv6 can use a DHCPv6 server for the allocation of IPv6 addressing to hosts. Another IPv6 addressing option utilizes the IPv6 Neighbor Discovery Protocol (NDP) to discover the first portion of the IPv6 address (network prefix) from local routers, and the host can create its own host ID. What standard is commonly used by an IPv6 host to generate its own 64-bit host ID

Answers

Answer:

Following are the answer to this question.

Explanation:

It is a mechanism, that is also known as EUI-64, which enables you an automatic generation of its specific host ID. It using the device on the 48-bit MAC address, which helps to construct the special 64-bit host ID. It also helps you to build a DHCP-type IPv6 network, that's why we can say that the above-given standard is widely used to create a 64-bit host ID on IPv6 servers.

Other Questions
Is Brutuss speech written in poetry or prose? Why does Shakespeare choose this form? Identify layers a and c respectively Which technical skill is most necessary for careers with network systems? A. website design B. programming languages C. information technology security D. graphics-related software Find what the value of x is pleaseThe choices are...1. 1182. 1083. 284. 58 CAN SOMEONE PLEASE HELP ME!! Using a specific example from the period 1450 to 1648, explain how classicism influenced the work of Northern Renaissance artists or Scholars Match the organism to the infection: Group of answer choices Streptococcus pyogenes [ Choose ] Varicella zoster [ Choose ] Papillomavirus [ Choose ] Enterococcus faecium [ Choose ] Borrelia burgdorferi [ Choose ] Bordetella pertussis a 30 ft 24 ft mat foundation is to be placed at 9 ft depth in a saturated clay where cu= 1200 psf and = 0. determine the net ultimate bearing capacity. David Inc, makes custom desks for individual customers. On September 1, there was one job in process, Job 243, with a cost of $4,000. Jobs 244, 245, and 246 were started during the month of September. Data on costs added during the month are as follows: Job 243 Job 244 Job 245 Job 246Direct Materials $8,000 $6,000 $7,000 $9,000Direct Labor 5,000 6,000 8,000 6,000 Overhead is applied to production at the rate of 50% of direct labor cost, Job 245 was completed on September 14, and the client was billed at cost plus 40%. All other jobs remained in process. What is the price of Job 245? O $41,300 O $19.400 O $18.900 O $22.400 Sheldon company had owner investments of $1,000; net income during the period of $5,000; and owner withdrawals of $250. the ending balance in the owner's capital account is:__________ A box with a mass of 25 kg is lifted to a height of 3 meters in 2 seconds. How much work was done?Group of answer choices735 J958 J245 J75 J What are two kinds of chemical properties of matter?Ability to shineAbility to burnAbility to bendAbility to rust What Was JAMESTOWN?help me Science Help - Ecosystem QuestionAre plants primary consumers or producers? a beach house in southern california now costs $350,000. inflation is expected to cause this price to increase at 5 percent per year over the next 20 years before eric and karinna retire from successful careers in commercial art. how large an equal annual end-of-year deposit must be made into an account paying an annual rate of interest of 13 percent in order to buy the beach house upon retirement? Bob bought a new car for $20,000 with a loan that will be amortized over 6 years. The best interest rate he got from his bank for the lan wes 29 percent compounded annually What is Bob's mothly car paymen OA. $361 27 OB. $418.72 OC. $369.90 OD. $450 73 Read the note Jackie received from her college roommate.Dear Jackie,I have left the house and I am staying with my parents for a while. I think I have figured out what is causing those strange squeaking noises in the middle of the night. I noticed this morning that there are holes in boxes of food in the cupboard. I also noticed that there are tiny paw prints next to the food boxes. I am afraid that our house has a mouse. Please call the superintendent and ask him to get rid of it. Hope to see you in a few days.MariaWhat is the big-picture answer in the note?A. staying with my parents for a whileB. squeaking noises in the middle of the nightC. holes in boxes of food in the cupboardD. our house has a mouse I need to know this please I have a 40% in this class and I have no clue what Im doing!!! assemblies of aligned magnetotactic bacteria and extracted magnetosomes: what is the main factor responsible for the magnetic anisotropy? What was the main reason Congress impeached Andrew Johnson?a tax evasionb sexual misconductc corruptiond violation of the Tenure of Office Acte illegal trafficking in slavery