What is the best way to improve an online search?
A. use detailed keywords
B. use a single keyword
C. avoid keywords
D. re-order the keywords

Answers

Answer 1

Answer:

A. use detailed keywords

Explanation:

[tex]{{hope it helps}}}[/tex]

Answer 2
The answer is A.

Being more specific with your search terms will improve online search due to the more room your search engine will have to work with.

Hope this helps and if it does, don't be afraid to rate my answer as well as maybe give it a "Thanks"? (Or even better a "Brainliest"). And if it’s not correct, I am sorry for wasting your time, and good luck finding the correct answer :)



Related Questions

low frequency radio wave travel in straight line and high frequency radio wave can travel in all direction true or false​

Answers

Answer:

The correct answer is True.

Explanation:

The electromagnetic spectrum consists of various waves. The Radio waves are categorized to be at the low-frequency end of this spectrum.

Radio Waves have multiple communication uses. Some of them are television and radio broadcasting, communications, and satellite transmissions.

Radio waves are not harmful to biotic life when absorbed by living matter and their transmission is unimpeded by air. Their transmission can also be absorbed, deflected, reflected, refracted, or diffracted by air molecules and the earth's surface.

Cheers

how is a trade off best described ?

dilema
compromise
demand
complication

Answers

I think the answer is compromise <3

Software and technology that allow people to work together on a task are known as

Answers

Collaborative software or groupware.

Answer:

Collaborative software

Choose the term that matches each description.

_____________ allows users to interact with computer hardware and application software.

______________allows users to complete specific tasks, such as creating a document.

______________allows programmers to create new applications.

Answers

Answer:

operating systems, word software, computer concepts for end users

Explanation:

operating systems allow users to interact with computer hardware and application software.

word software allows users to complete specific tasks, such as creating a document.

computer concepts for end users allows programmers to create new applications.

The answer is "operating systems, word software, and end-user computer concepts", and its further explanation can be defined as follows:

The OS includes and administers all applications and software which a computer or mobile device could indeed execute, meaning the governance of the device software or hardware.The software for word processing is used for manipulating texts like a resume or report these text documents. Usually, you type in text and the software offers copy, delete, and numerous page layout devices.Study tools and coding areas allow finished to tailor apps to their needs and understanding instead of expert developers.

Thus, the answer is "operating systems, word software, and end-user computer concepts".

Learn more:

brainly.com/question/17798901

Henry wants to use handheld computers to take customers' orders in her restaurant. He is thinking of using custom written, open source software. Describe what is meant by custom written software.

Answers

Answer: See explanation

Explanation:

Custom written software refers to the software that's developed for some particular organization or users. It's crates in order to meet the unique requirements of a business.

Since Henry is thinking of using custom written, open source software, then a custom written software will be used. Examples of custom written software will be automated invoicing, bug tracking software, E-commerce software solutions etc.

En la 4ta revolución industrial se caracteriza con 3 procesos de aprendizaje o criterios, los cuales son:

Answers

Explanation:

-Uso de herramientas digitales

-La inteligencia artificial

-El análisis de datos para formar personas altamente competitivas

Which risk mitigation framework allow scope for research and acknowledge for risk mitigation.

Answers

Answer:

NIST SP 800 30

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Risk management can be defined as the process of identifying, evaluating, analyzing and controlling potential threats or risks present in a business as an obstacle to its capital, revenues and profits.

This ultimately implies that, risk management involves prioritizing course of action or potential threats in order to mitigate the risk that are likely to arise from such business decisions.

NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.

The NIST SP 800 30 is a risk mitigation framework that provide guidance for conducting or allows scope for research, assessment and acknowledgement for risk mitigation of federal information systems and organizations.

Typically, NIST SP 800 30 is used for translating cyber risk so that it can easily be understood by the chief executive officer (CEO) and board of both a public and private organization.

in what century was plastic invented ?​

Answers

in the year 1907 plastic was invented

The remove() method in the Queue interface ________. Group of answer choices retrieves, but does not remove, the head of this queue, returning null if this queue is empty retrieves and removes the head of this queue, or null if this queue is empty retrieves, but does not remove, the head of this queue, throwing an exception if this queue is empty retrieves and removes the head of this queue and throws an exception if this queue is empty

Answers

Question:

The remove() method in the Queue interface ________.

A. retrieves, but does not remove, the head of this queue, returning null if this queue is empty

B. retrieves and removes the head of this queue, or null if this queue is empty

 

C. retrieves, but does not remove, the head of this queue, throwing an exception if this queue is empty

D. retrieves and removes the head of this queue and throws an exception if this queue is empty

Answer:

D. retrieves and removes the head of this queue and throws an exception if this queue is empty

Explanation:

In Java, the Queue interface is found in the java.util package and inherits from the Collection interface. It is used to store elements which are processed in the order in which they are inserted. This means that the first element will be processed first.

The Queue interface has many methods. Some of them are;

i. add(): allows elements to be added to the queue.

ii. remove(): retrieves and removes elements from the head of the queue. The head of the queue points to the first element of the queue. If the queue is empty, the remove() method throws an exception called the NoSuchElementException

iii. poll(): retrieves and removes the element at the head of the queue. Unlike the remove() method, if the queue is empty, a null is returned.

iv. peek(): retrieves but does not remove the element at the head of the queue. Just like the poll() method, a null is returned if the queue is empty.

Write a loop that continually asks the user what food the user has in their refrigerator until the user enters apples, in which case the loop ends. It should acknowledge the user in the following format. For the first food, the user might say "hamburger," so your response would be, "You have a hamburger with a total of 1 food(s) if they enter hamburger, and so on until they enter “apples” at which point the loop ends. ---- make sure you save your file as "may28.py" *

Answers

(Disclaimer: I am not a professional, so it might not be the most concise answer possible, but I did run the Python script and it works)

Answer:

user_input = input("What food do you have in your refrigerator? ").lower()

count = 0

while True:

   if user_input != 'apples':

       count += 1

       print(f'You have a {user_input} with a total of {count} food(s)\n')

       user_input = input("What food do you have in your refrigerator? ")

   else:

       break

pls any one what is pheumatic and hydrautic ​

Answers

Answer:

pheumatic is a branch of engineering that make use of gas

hydraulic is a technology and aplied science using engineering

Write a structured algorithm that prompts the
user to input two numbers. The algorithm should
multiply both numbers and then prompt the
user to enter the answer. The algorithm should
compare the answer entered with that calculated
and output "correct answer" or "incorrect answer"
accordingly. At the start, input how many sums
will be done.

Answers

Answer:

Step 1 : Start

Step2 : Input first number, num1

Step3 : Input second number, num2

Step4 : product - - > num1 * num2 (product of num1 and num2)

Step5 : Input product, myanswer

Step6 : comparison - - - > correct or incorrect based on myanswer and product

Step6: print(comparison)

Step7: End

Explanation:

Algorithm is a sequence of instructions a computer is expected to follow to solve a particular problem.

Required :

Two inputs ; num1 and num2

Expected output

Algorithm :

Step 1 : Start

Step2 : Input first number, num1

Step3 : Input second number, num2

Step4 : product - - > num1 * num2 (product of num1 and num2)

Step5 : Input product, myanswer

Step6 : comparison - - - > correct or incorrect based on myanswer and product

Step6: print(comparison)

Step7: End

The two numbers to multiply are entered ; the product is calculated by the program ; the the user inputs his or her own expecteted product ;

Both are compared and the output of the comparison is displayed (either correct oe incorrect)

What is machine level language ?​

Answers

Explanation:

The machine-level language is a language that consists of a set of instructions that are in the binary form 0 or 1. As we know that computers can understand only machine instructions, which are in binary digits, i.e., 0 and 1, so the instructions given to the computer can be only in binary codes.

I get such an error when I turn on the computer, how can I fix it?

Answers

Answer:

Use the HLL ( Java C++ ) code to fetch the commands of that program, then translate them using any translatory program such as Microsoft notepad.

Or:

Download any utility software such as Avast, thunderbird, Dr. Solomon, or Norton software

Then install it to memory.

E) ¿Entiende usted que tendría repercusión legal un mal manejo de los datos del cliente por parte de la empresa? ¿Por qué?

Answers

Answer:

Efectivamente, un mal manejo de los datos del cliente por parte de la empresa tendría repercusiones legales que afectarían negativamente a la compañía. Esto es así porque un eventual mal manejo de los datos personales de los clientes implicaría una filtración de dichos datos hacia el resto del público, con lo cual los datos personales y privados de cada cliente se verían expuestos en forma pública, generando así posibles daños a estos a través de la mala utilización de dicha información por parte de terceros malintencionados.

What is a benefit of using a client/server network?
Cheap to maintain
Easy to install
Has a central, powerful computer
Unable to share files

Answers

Answer:

Has a central powerful computer

Explanation:

When operating a client - server network, a certain access mediun is created such that clients can access information, materials and services from a central computer, this poses great advantage in the area of security and control. Clients would be able to gain access from this central computer using either a local or wide area network. The accessibility provided through this powerful, central computer allows the the network to monitor what actions are being performed and make appropriate restrictions on the network, hence, preventing the invasion of malware and viruses. Hence, the central control is a great feature of a client - server network.


1.can you identify the materials needed in making simple circuit???

2.what is the use of each material
in making simple circuit???

Answers

Explanation:

Small light bulb (or a flashlight bulb): To detect the power supply through the circuit.Wire (of suitable length and ampere specifications): To connect the electrical elements for the supply of power as electric current. Bulb holder: To mount the bulb, connecting it to the power source.Battery with the appropriate voltage for the light bulb: As a source of electric power. Two alligator clips: To connect the wire-terminals of the circuit to the terminals of the battery.  Electrical tape: To insulate the wire joints/connections at any point.  Switch: To toggle the power supply in the circuit.

what are the advantages of saving files in a cloud?
Please help!! ​

Answers

When using cloud storage, one of its main advantages is the accessibility and its ability to not get deleted as easily. Once a file is uploaded to the cloud, you can access it from almost any device as long as you have connection. And it’s not as easy from something to get accidentally deleted, as there is a backup.

write a program to enter RADIUS of a CIRCLE and PRINT AREA of TRIANGLE using Q Basic. (class 8)​

Answers

Answer:

The program is as follows:

10 INPUT RADIUS, BASE, HEIGHT

20 CIRCLE = 3.142* RADIUS * RADIUS

30 TRIANGLE = 0.5* BASE * HEIGHT

40 PRINT CIRCLE

50 PRINT TRIANGLE

60 STOP

Explanation:

The program description doesn't tally;

In other words, it is impossible to calculate the area of a triangle using the radius of a circle.

So, I designed the program to get input for radius, base and height.

Get input for radius, base and height

10 INPUT RADIUS, BASE, HEIGHT

Calculate area of circle

20 CIRCLE = 3.142* RADIUS * RADIUS

Calculate area of triangle

30 TRIANGLE = 0.5* BASE * HEIGHT

Print area of circle

40 PRINT CIRCLE

Print area of triangle

50 PRINT TRIANGLE

End of program

60 STOP

Identify characteristics of object-oriented programming design. Choose all that apply


-It breaks the solution into independent objects.


-it is a simple, uncomplicated approach to programming.


-It uses objects that send data to other objects.


-It supports a modular design that encourages the reuse of code.

Answers

Answer:

It breaks the solution into independent objects

It supports a modular design that encourages the reuse of code

Explanation:

Object-Oriented programming (OOP) is a programming language type that makes use objects and classes in its construct. With object-oriented programming software is structured as classes which are both reusable and simple code blueprints used for the creation of instances of the objects of the program

An object oriented program design breaks the solution of the problem the program is solving into independent objects, such that the objects are made of classes which are modular and reusable code

Therefore, the correct options are;

It breaks the solution into independent objects

It supports a modular design that encourages the reuse of code

Answer:

all expect b

Explanation:

PLEASE I NEED HELP FAST

Answers

Answer:

your answer will be src=

whats the answer :)?
i will give brainslist​

Answers

Answer:

Transmission medium is the answer

Tin học đã làm thay đổi công tác văn phòng ngày nay như thế nào?

Answers

Công nghệ đã thay đổi cách mọi người sử dụng để giao tiếp ở nơi làm việc hiện đại

A small business utilizes a SOHO router and wishes to secure its existing wireless infrastructure. The business has fewer than ten devices, which are a mixture of old and new machines. Due to the varying ages of the machines, the latest wireless encryption methods may not be supported on all devices. Which of the following would be the MOST cost-effective method to add a layer of security while allowing all machines to connect?
A. MAC filtering
B. 802.1X
C. WPA2
D. EAP-FAST

Answers

Answer:

C

Explanation:

WPA2 builds on its predecessor, WPA, and is specifically designed to meet the most demanding enterprise security needs. ... Furthermore, because WPA2 is backwards- compatible with WPA, organizations that have already implemented the WPA standard can migrate to WPA2 at their own pace.

write an algorithm to find perimeter of circle

Answers

Answer:

Here’s one!

Given [math]R[/math], the radius of the circle.

Let [math]N,D\leftarrow 0[/math]

Repeat until [math]D[/math] is large enough (about 1,000,000)

[math]x,y\leftarrow U[0,1][/math]

If [math]x^2 + y^2\le 1[/math] then [math]N\leftarrow N+1[/math]

[math]D\leftarrow D+1[/math]

[math]P\leftarrow\frac{8NR}{D}[/math]

Return [math]P[/math]

[math]U[0,1][/math] is a uniform random number in the range [math][0,1][/math].

Explanation:

list 5 uses of computer​

Answers

Answer:

if you a student..then you need it for sure

Explanation:

Microsoft Office

Doing assignment

doing report

answer online test/quiz

movie

make money

typing

play game

how many sections of a job description are there

Answers

Answer:

6

Explanation:

job title, job purpose, job duties and responsibilities, required qualifications, preferred qualifications and working conditions.

The lines that can be formatted to display on the edges of cells are called _______.

style lines
edge lines
borders
underlines

Answers

Answer:

borders

Explanation:

Borders can be formatted in cells of excel or goog.le sheets. You can change width, shape, color, and whole plethora of things!

The lines that can be formatted to display on the edges of cells are called [tex]\boxed{ borders . }[/tex]

a. style lines

b. edge lines

c. borders

d. underlines

[tex]\large\mathfrak{{\pmb{\underline{\orange{Mystique35 }}{\orange{❦}}}}}[/tex]

use of concave mirrors​

Answers

Explanation:

concave lens use for shaving mirrors and satellite

What is a signature?

a distinctive characteristic of a virus or virus family

an anti-spyware feature of Windows 7

a computer program that replicates itself and damages a computer system

a program that tracks a user’s activities online

Answers

Answer:

option a

never heard of b, c would be called a virus and d a cookie

Other Questions
Folk music ____. Question 9 options: a. is mostly acoustic music that is historically popular with authority figures b. is a genre with a rich history of protest lyrics and a focus on social and political issues c. used electric guitars and loud drum solos to establish its distinctive sound d. was at the heart of the payola scandals of the 1950s e. has its roots as music composed and written down by so-called ''Tin Pan Alley'' The soldiers were awestruck when they saw the village of the Bishnois, yet they were ready todestruct that peaceful and healthy environment. In what way would they not only damage the environment, but the faith and trust of people as well?Please answer the question HELP ASAPBrittany and two of her friends want to join a softball league. The league requires teams to have at least nine players, but teams cannot have more than fifteen players. In interval notation, how many more people can join Brittany's team? Shem will select a letter at random from the word PROBABILITY. Japhet will select a letter at random from the word STATISTICS. Who is more likely to pick the letter I? What if . . . you were a judge and you had a repeat offender for purse snatching in your courtroom? This individual has already been on probation and home incarceration. The individual has also spent a couple of years in prison but keeps recidivating. What other sentencing option can you envision that may deter this individual from committing further crimes? onDirections: Choose the correct answer listed from the box below and thenwrite the letter of your answers a separate sheet of paper for youranswers.1. It is formed from the fossilized remains of prehistoric plants andanimals2. An earth's material results from the rock fragments that have beencreated physical weathering.3. Another earth's material naturally occurred in solid substances thatare composed of ions and molecules bonded together.4. The materials are derived from nature and used by the people tosurvive or satisfy needs.5. The place where natural resources are rich has fertile arable landsand home to the largest metallic minerals6. To use without being completely used up or destroyed7. A practice to use the resources wisely8. A renewable resource produces the most electricity9. An energy resource that will run out in the next several years10. Renewable energy coming from the sun4.Non-renewableE. PhilippinesII. SustainableB HydroelectricF. MineralsJ. Fossil fuelC. SoilG. Natural resourcesK. Solar EnergyD. Conservation 2n-3>15, select all values of n would make this inequality true, options are 2, 5, 9, 10, 12 WHAT IS THE SUPPLY CHAIN FRAMEWORK'S IN OKADA? WHAT IS THE MODEL ? I love people taking my photographs. (into passive) (This is for Driving Ed) Explain the "point of no return" and why it's important. examples of isotones Fleming Sign Company uses the allowance method in accounting for uncollectible accounts. Past experience indicates that 6% of accounts receivable will eventually be uncollectible. Selected account balances at December 31, 2017, and December 31, 2018, appear below: 12/31/14 12/31/15 Net Credit Sales $400,000 $500,000 Accounts Receivable 60,000 80,000 Allowance for Doubtful Accounts 5,200 ?Record the following events in 2015.Aug. 10 Determined that the account of Sue King for $800 is uncollectible.Sept. 12 Determined that the account of Tom Young for $3,700 is uncollectible.Oct. 10 Received a check for $500 as payment on account from Sue King, whose account had previously been written off as uncollectible. She indicated the remainder of her account would be paid in November.Nov. 15 Received a check for $300 from Sue King as payment on her account. Evaluate expressions- if A=4 and B=9 what is the value of the following expression 20/a+7bA.28B.33C.68D.108 Fill in with the correct future form. (8pts) 1. I expect we ... (be) there in half an hour. 2. I... (go) to see the Picasso exhibition at the National Gallery tomorrow. 3. Andrew ... (be) thirteen years old on September 3rd. 4. He (fly) to Frankfurt by the time I arrive in London. 5. This time next week, I ... (fly) to Jamaica. 6. It's really cold today. I think it ... (snow). 7. John ... (work) in London for three years by the end of the month. 8. I'm sure we ... (win) the match now. what's the explicit formula for 5,10,15,20,25,30 If you are unhappy about the current transportation system, which of the following politicians will you vote for?A. Politicians who advocates going to war abroad B. Politicians who wants to improve roads and highways C. Politicians who aim to improve the educational systemD. Politicians who suggest increasing the sales tax Help! 3-4 quick please!! A construction worker is carrying 40kg if he travels a distance of 50 meters how much work is being done Prepare a stock available at home following the procedure you learned in this lesson. Have a picture of the finished product and a narration on how you do it What do you think some of the challenges would be for countries which had been colonized?Welpp