A search expression entered in one search engine will yield the same results when entered in a different search engine.
A. True
B. False

Answers

Answer 1

Answer:

false

Explanation:


Related Questions

1.What are the importance of installation procedures of Windows 7?

Answers

Answer:

Check System Requirements

Check Hardware and Software Compatibility

Determine Disk Partitioning Options

Complete a Pre-Installation Checklist

Explanation:

PLEASE HELP, MAKE SURE IT IS THE CORRECT WAY!! 100 POINTS!!!

Joe, a project manager, calls your extension because his computer just crashed. He lets you know that his computer will not connect to the internet, that he has lost multiple files, and he needs to get things back up and running in the next hour due to an important meeting he is scheduled to host. He is irritated because he is working on an older laptop and is getting a new one next week. He says that he knew this would happen and wishes that this laptop worked for just one more week.

He is agitated and in a panic. He is afraid that he has lost all his important documents and is blaming the company’s technology. As you ask him questions to find out more about the problem, you make the rookie mistake of asking, “Have you tried restarting your computer?” Joe explodes in a rage and screams that he already told you that he did and that you are not listening to him.

You are now in a situation where you not only need to determine the cause of the problem and fix it, but you also need to calm this individual down so that you can get clearer and more accurate information.

What do you do?

Answers

Consider his point of view and apologize politely. Reason out the causes in a calm and orderly manner. Take deep breaths and listen to what he has to say.

What type of software might be somewhat "light" in functionality even though they
usually allow you to apply filters and special effects in a relatively straightforward
manner?
A. functionality software
B. watermark software
C. third-party software
D. proprietary software

Answers

The answer is d because it s the only one that makes sense here

The type of software that might be somewhat "light" in functionality even though they usually allow you to apply filters and special effects in a relatively straightforward manner is third-party software. Thus, the correct option for this question is C.

What do you mean by Software?

Software may be defined as a set of instructions, data, or programs which are considerably utilized in order to operate computers and execute specific tasks with respect to the instructions. The function of the software is absolutely the opposite of the hardware.

According to the context of this question, third-party software is a computer program that is constructed or developed by different companies, organizations, etc. For example, any software program working on a Microsoft computer that was not developed by Microsoft. This reveals an example of third-party software.

Therefore, third-party software is a type of software that might be somewhat "light" in functionality even though they usually allow you to apply filters and special effects in a relatively straightforward manner.

To learn more about Softwares, refer to the link:

https://brainly.com/question/28224061

#SPJ2

Lane received a phone call from a client. The client claimed that a file he was working on the day before had disappeared from his computer along with several other files. Lane went to the client’s desk to see if she could rebuild the files from the backup done the night before. Lane found and rebuilt the files from the backed-up data. When lane called the next morning to see if everything was working, the client said that two of his files were gone again. He also noticed new files in a folder. When lane arrived, she checked to see how much free space the computer had available and found that it had 250gb less than the day before. What is the issue with the client’s computer?
a. Spam
b. Corrupt hard drive
c. Bad hard drive driver
d. Computer virus

Answers

There are different kinds of virus. The  issue with the client’s computer is Computer virus.

What is computer virus?

A computer virus is known to be a kind of computer program that, when used, can recopy itself by modifying other computer programs and putting its own code.

The Examples of computer viruses are:

Worms Trojans , etc.

The issue with the system that Lane is working on is virus and it can be worked on by using Anti-virus.

Learn more about Computer virus from

https://brainly.com/question/20407534

If the start index is __________ the end index, the slicing expression will return an empty string.

Answers

Answer:

"Greater than."

Explanation:

The designated end of a string cannot be reached from the start. For example, if you had a list labeled 'colors' (colors = [1,2,3,4]) and then you tried to bring back that list using colors[1:0], you will recieve an empty string. However, if the starting is lower than the final index, then your program will run. For example, if you use colors[0:1], you will be given the output: [1].

A(n) ________ is a way of retrieving information from one or more tables that defines a particular subset of data.

Answers

Answer:

completeness

Explanation:

A subquery whose return value depends on the row being returned in a main query is called a(n) _____ query.

Answers

Answer:

correlated

Explanation:

A correlated subquery is a method of reading each row of a table and comparing the values in each row to related data. It's utilized when a subquery has to deliver a different result or collection of results for each candidate row that the main query considers. I hope this helps! ^-^

What is a program that includes a function parameter capable of doing?
O
A. Passing data to a function whenever it is called
B. Storing data after a function is called
C. Returning data after a function completes a task
D. Ensuring that all function calls in the program are identical

Answers

A software program that includes a function parameter is capable of: A. passing data to a function whenever it is called.

What is a function parameter?

A function parameter can be defined as a special kind of variable which is used in a function to point to a data that is provided as input into the function.

This ultimately implies that, a software program that is coded by a software developer or programmer to include a function parameter is capable of passing data to a function as an input, whenever it is called.

Read more on function parameter here: brainly.com/question/20264183

I need help on this, need answer asap.

Answers

Answer:

int main() {

int _2dArray[32][32];

for (int i = 0; i < 32; i++) {

 for (int j = 0; j < 32; j++) {

  _2dArray[i][j] = j + i * 32;

 }

}

return 0;

}

Explanation:

Here is a generic C/C++ 2d array traversal and main function example. The rest you'll have to figure out based on what kind of app you're making.

Good luck!

20 points!!!!! Help, I am being timed!!!!!!!

Don't just answer for the points!


Which snippet of code is in XML?

Answers

Answer: XML files that contain the code that to be inserted, elements that control its behaviour and metadata such as the author's name.

Explanation:

Which of the following statements will cause a compile-time error? Parent person = new Child(); person.grade(); Child person = new Child(); person.gra

Answers

The  statement that will cause a compile-time error is  Parent person = new Child(); person.grade();

What is compile-time error with example?

A compile-time error is known to be a kind of errors that matches to that of semantics or syntax.

It is often known as Syntax errors and it occurs if the programmer does not use the steps of the syntax in the  programming language, due to the above, the compiler will bring out the syntax error.

Learn more about error from

https://brainly.com/question/18497347

When working on electronic devices, what should you use to dissipate any static charge that might damage electronic chips

Answers

Anti-static bracelet/wristband
You put the bracelet on
The clip attached to something that’s very large and metal so that you are “grounded”
This is commonly used by PC builders

What is it called when a programmer includes a step in an algorithm that lets
the computer decide which group of steps to perform?
Alteration
B. Selection
OC. Sequencing
OD Storage

Answers

Selection is the step in algorithm that let's the computer decide which group of steps to perform.

What is Algorithm?

This can be defined as set of instructions which are used for solving a problem or accomplishing a task.

Selection happens when there are one or more options are available in which the computer decide which group of steps to perform.

Read more about Algorithm here https://brainly.com/question/11302120

Answer:

its A

Explanation:

A practice to ensure threads finish a required method before another thread starts is to use the _____ keyword in the method header.

Answers

A practice to ensure threads finish a required method before another thread starts is to use the synchronized keyword in the method header.

What is Synchronized keyword in terms of Java?

This is known to be the act of giving room for only a single thread to be able to access the shared data or resource at a given timeframe.

Note that it often help users to be able to protect their data from being access by different threads and as such, a practice to ensure threads finish a required method before another thread starts is to use the synchronized keyword in the method header.

Learn more about keyword from

https://brainly.com/question/2960292

Information should be________to ensure more than one source provides the same factual information. a. repeated c. cross-lined b. cross-examined d. cross-checked please select the best answer from the choices provided a b c d

Answers

Information should be cross-checked to ensure more than one source provides the same factual information.

What is the source of information?

The source of information is the place, from where the data or information is generated. There are many sources of information, like internet, newspaper, television etc.

The options given in the problem regarding the information as,

a. repeated b. cross-examinedc. cross-lined d. cross-checked

There are many feck news and nonfactual data is present over the internet and other source of information.

To get the factual information, one should always cross-checked the information from other sources.

Thus, the information should be cross-checked to ensure more than one source provides the same factual information.

Learn more about the source of information here;

https://brainly.com/question/26169752

Answer:

D

Explanation:

D

The ________ states that given two plausible explanations for the same event, one should accept the less complex version.

Answers

Answer:

Rule of Parsimony

Explanation:

You watch a movie where a secret agent puts a small device on a telephone line so that they can
listen to conversations between two other people. This is an example of:
O snooping.
O social engineering.
O wiretapping
O data confidentiality.

Answers

Answer:

wiretapping

have a good day :)

Harry’s Shoe Store has noticed a significant increase of revenue of $123,000. The manager has also determined that the total expenses equal to $128,000. Will this business net a profit or loss? _______ How much of a profit or loss? ________

Answers

Answer: Loss by $5,000

Explanation:

As you see, the loss is greater than profit. Simply subtract loss-profit

how are technology and technician interrelated to each other

Answers

Answer:

the technician is the technology so connected because without the technician how can we keep the technology running

Explanation:

without the technician, nothing technological would work for a long time

Dropdown
Complete the sentence
A good digital citizen is

Answers

Answer:

A good digital citizen is one who knows what is right and wrong, exhibits intelligent technology behavior, and makes good choices when using technology.

Explanation:

Answer:ethical

Explanation:

i got a 100 %

1. What can you say about the picture?

Answers

Answer:

What picture?

Explanation:

Where is the picture? We need the picture in order to answer your questions

Effectiveness of thicker,biodegradable plastic shopping bags

Answers

The Effectiveness of thicker, biodegradable plastic shopping bags is that they can last for a long time and still be able to carry shopping items  even if they are exposed to natural environment.

What is the use of biodegradable plastic bags?

Plastic bags are known to be part of modern technology. They are usually very  thin and strong. They are able to carry a heavy load as a result of shopping.

Conclusively, Note that this type of plastic bags which are said to be biodegradable can last for a long time and still be able to carry shopping items  even if they are exposed to natural environment.

Learn more about bags from

https://brainly.com/question/728465

Jennifer is moving to nashville in a few weeks and needs to find an apartment to rent. She has looked online, talked to her new coworkers about safe areas close to work, and read through nashvilleguru. Com to gather information for her decision. She has narrowed down the area she wants to live to the gulch, which is a walkable neighborhood and friendly for young urban professionals. Now she is assessing which available apartment buildings and condos in the gulch suit her wants and needs most. Jennifer is working through which part of the consumer decision-making process?.

Answers

The part of the decision-making process that Jennifer is working through is: evaluating alternatives.

What is the decision-making process?

Decision-making process can be defined as a cognitive process that involves gathering information, analyzing the information, and assessing or evaluating alternatives, so as to enable the proper selection of an optimum solution (choice).

In this scenario, evaluating alternatives is the part of the decision-making process that Jennifer is working through because she is assessing all available apartment buildings.

Read more on decision-making process here: https://brainly.com/question/1249089

A radio is basically made of two parts:


A. A gyroscope and a vacuum tube.


B. A transmitter and a receiver.


C. A cathode and an anode.


D. A motherboard and a CPU.

Answers


A transmitter and a reciever

What is the shortcut key for opening a new tab in a web browser.

Answers

Crtl + T is the answer

Which networking device behaves similarly to an access point that conforms to the IEEE 802.11b standard

Answers

Answer: a Hub

Explanation: Hubs are used to combine connections with ethernet cables, typically routing with switches to IDF>MDF>ISP etc.

Why are telephoto lenses known for creating a pincushion effect on images?

A. because the shrinking of the image decreases on the edges of the frame

B. because the magnification of the image decreases on the edges of the frame

C.
because the shrinking of the image increases on the edges of the frame

D. because the magnification of the image increases on the edges of the frame

Answers

Answer:

D is the correct answer.

Answer: d because the magnification of the image increases on the edges of the frame

Explanation:

Question 5 of 10
Which step might be included in an algorithm for a self-driving car?
A. Ask another driver for help
B. Analyze data from the car's external cameras.
O C. Look up directions.
D. Read a physical map of the streets.

Answers

Hello!

Answer:
B. Analyze data from the car’s external cameras.

I hope that this helps you!

Answer:

B.

Explanation:

What is output? public class vehicle { public void drive(){ system.out.println("driving vehicle"); } }

Answers

The system will print “driving vehicle ”

Why is it important to enforce access controls and to keep logs regarding who has access to data closets

Answers

Answer:

To ensure that in the event of a failure or breach, there is a record of when the equipment was accessed.

Explanation:

Hope this helps:)....if it don't then sorry for wasting your time and may God bless you:)

Answer:

it is important to enforce access controls and to keep logs regarding who has access to data closests is

Explanation:

To encure that in the event of a failure or breach, there is a record of what the equipment was accessed.

Other Questions
Please Help me AsapRob's first four test scores are 80, 85, 100, and 85. What does he have to score on the last test in order to have a test average of 90?options:901001095 What is the Cube root of 125x^12?5x25x425x225x4 is 5.029 less than 5.128 What is the main focus of what your story PLEASE ANSWER 30 POINTS!!!!! 5x + (-x) - 1 = 11 - 2x Which angle is coterminal with a 120 angle?A. An angle measuring 300B. An angle measuring-120C. An angle measuring 470D. An angle measuring 480 The cost proposed by the taxi company that charges $3 for the taxi drop plus $1.50 for each mile driven can be expressed as c=The cost proposed by the taxi company that charges $2 for the taxi drop plus $1.75 for each mile driven can be expressed as c= help me PLEASE, it's physical science D: The ________ is a Sumerian invention that helps determine the appropriate time for agricultural cultivation. Find the area of the shaded polygons. it has the diameters of 6, 8, 10. I WILL AWARD BRAINLIEST. PLS HELP ASAP I NEED THIS PLSSSS pls need help in math Prokaryotic DNA is:(Fill in the letters, this is for a crossword)_ e _ _ _ _ _ _ _ The Declaration of Independence includes the right __________.A) to use violent means to get the governments attentionB) to remove a government if it does not protect citizen's basic rightsC) of all men and women to elect their public officialsD) of all men and women to run for public office The man _who__ is wearing glasses is my uncles friend classify the underline word Listen to the following activities and write down how each individual in question just finished completing them. OJO! Be sure to start each sentence with a capital letter and end with a period Which verb form correctly completes the conversation?Andr: Tu aimes ce tableau?Gustave: Non. Parce que je ne ______ pas ce style.A. comprendB. comprennentC. comprendsD. comprenons Additional protections researchers can include in their practice to protect subject privacy and data confidentiality include: Hinduism was founded by How do you write thirteen and seventy-two hundredths as a decimal number?