Answer:
1. Syntax search looks for matching documents that contain one or more specific words
2. quotation marks can be used to make a keyword search more specific when looking for a specific phrase
3. Boolean operators can be used to broaden (OR) or narrow (AND) a search
Answer:
1. A keyword search looks for matching documents that contain one or more specified words.
2. Quotation marks can be used to make a keyword search more specific when looking for a specific phrase.
3. Boolean operators can be used to broaden (OR) or narrow (AND) a search.
Explanation:
A type of search that looks for matching documents that contain one or more words specified by the user.
If you put quotation marks around a word or phrase, the search results will only contain results that match exactly the word or phrase in the quotes.
Boolean operators can broaden (expand) and narrow (restrict) searches to increase the number of relevant search results we retrieve.
and there you go
sorry its saying my thing is tooo small
Answer:
Global knowledge
Explanation:
It has been proved by scientists that the earth is round
Hope this helps!
Which are ways cybercriminals act? Select 3 options.
log keystrokes of other users
destroy information
sell usernames and passwords
share open-source software
correct social injustice
Answer:
Destroy information, log keystrokes of other users and sharing open-source software
Explanation:
Log keystrokes of other users, destroy information, Sell usernames and passwords are the three ways in which cybercriminals act.
What are cybercriminals?Cybercriminals are individuals or groups who use technology and the internet to commit crimes, including theft, fraud, identity theft, and other malicious activities.
Cybercriminals operate in three ways:
Logging other users' keystrokes: This is a type of cyber attack in which the attacker uses software or hardware to record every keystroke a user makes on their computer or mobile device.Attempt to destroy or alter data stored on a computer or network: Cybercriminals may attempt to destroy or alter data stored on a computer or network in order to cover their tracks or to cause harm to the organisation.Selling usernames and passwords is a common way for cybercriminals to make money.Thus, share open-source software and correct social injustice are not ways in which cybercriminals act.
For more details regarding cybercriminals, visit:
https://brainly.com/question/31148264
#SPJ3
Try to guess my favorite music genre and i will give you a brainliest.
Answer:
Rock n' roll. This I know for sure.
Which action does not happen in each iteration of the repeat loop in the
code?
O A. The shark position is set to the top left of the screen.
O B. The number of sharks decreases.
O C. The program pauses for 2 seconds.
D. The shark follows the fish at a speed of 20.
The action does not happen in each iteration of the repeat loop in the code is the number of sharks decreases.
What does iteration mean?In terms of IT and computer programming, the word iterative is known to be a term that connote the act where the set up of a product or application is said to be improved through the use of repeated review and also that of testing.
Note that based on the program above, the action does not happen in each iteration of the repeat loop in the code is the number of sharks decreases as it does not concern it.
Learn more about iteration from
https://brainly.com/question/25754804
#SPJ2
Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What should he do?
A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.
Answer:
C. Configure a safe sender
Explanation:
It’s dabest thing to do
As per the given scenario, Walt should need to configure a safe sender. The correct option is C.
What is configuration?A system's configuration in communications or computer systems refers to how each of its functional elements is organised in relation to their nature, number, and distinguishing features.
Configuration frequently involves picking the right hardware, software, firmware, and documentation.
A person, group, or organisation that starts the communication is known as the sender. The success of the message stems primarily from this source.
The communication is influenced by the sender's experiences, attitudes, knowledge, competence, perspectives, and culture.
Walt must take care to prevent messages from a colleague in a different organisation from ever being mistakenly classified as spam. He ought to set up a secure sender.
Thus the correct option is C.
For more details regarding configuration, visit:
https://brainly.com/question/13410673
#SPJ2
will I be able to play among us?
Answer:
yea
Explanation:
Answer:
no clue but this gives me 10 points.
Explanation:
How do I find/search for someone???
I've been looking forever. Please help!!!
Answer:
if you have seen their profile before and know their name, search their name in your history, or if you know someone who is friended them and your friends with them, then look at your friends, friends list and they should be there, or if they have commented and or answered somewhere you have been, you can search there.
Explanation:
Choose all statements that identify the benefits of programming design.
It allows programmers to be more creative in writing the code.
It provides a design approach to a specific type of problem.
It ensures that all code will work together.
It results in fewer lines of code.
i hope this helps ( B and C)
b and c
Explanation:
b and c.........................