Answers

Answer 1
Search engine is a software to help find you results over the internet.

Examples of search engines are: Google, Safari, Yahoo etc.
Answer 2
A search engine is a program that searches for and identifies items in a database that correspond to keywords or characters specified by the user, used especially for finding particular sites on the World Wide Web.


Examples: Safari, Google, Bing, Yahoo...

Related Questions

The number of pixels displayed on the screen is known as ________.

Answers

Resolution of the screen. Ex. 1366x768

The fuel-injection system in car engine uses a (n) ________ operating system

Answers

Answer:  An embedded operating system.

Explanation
An embedded operating system is an operating system that performs specifically designated tasks that another system needs. 

For example, a car engine performs several tasks such as fuel injection, cooling, lubrication, steering and many other mechanical tasks that an embedded operating system does not address.

An embedded operating system may collect operational data from several sensors within the car engine, analyze the data in real time, and transmit the results to the main on board computer that monitors and adjusts for changes in the operational status of the engine.

Because an embedded operating system is usually designed to perform essential specific tasks, the embedded operating system should perform efficiently,  reliably and be durable.

True or False: If your driver license or license plates are suspended for not obeying either financial responsibility laws, you will not be able to get a temporary license for any reason, not even for work purposes.

Answers

Statement Is True.

Further Explanation:

The Financial Responsibility Law requires owners and operators of motor vehicles to be  financially responsible for damages and/or injuries they may cause to others when a motor  vehicle crash happens. This law requires any person to have bodily injury liability insurance at  the time of the following:

A Citation for DUI, which results in a revocation. These cases require the following minimum  insurance coverage

$100,000 Bodily Injury Liability (BIL) (to one person). $300,000 Bodily Injury Liability to two or more persons. $50,000 Property Damage Liability (PDL)

If your driver license or license plates are suspended for not obeying either financial responsibility laws,  you will not be able to get a temporary license for any reason, not even for work purposes. It is TRUE.

Description:

According to the law it proves that you have the required insurance. If you don't, you may  receive a citation for not having proof of insurance. If your driver license or license plates are  suspended for not obeying either of these laws, you will not be able to get a temporary license  for any reason, not even for work purposes.  You could not violate the law :

“You must maintain insurance coverage throughout the vehicle registration period or you  must surrender the license plate(s) to any driver license or tax collector office”.

Learn more:  

The two motor vehicle insurance laws in Florida are the financial responsibility law and the what

        brainly.com/question/10742151

Keywords: Financial Responsibility Law, insurance, BIL, PDL

Final answer:

If your driver's license or license plates are suspended for not obeying financial responsibility laws, you will not be able to get a temporary license for any reason, including work purposes.

Explanation:

If your driver's license or license plates are suspended for not obeying financial responsibility laws, you will not be able to get a temporary license for any reason, including work purposes.

Suspension of driver's license or license plates is a serious consequence for not complying with financial responsibility laws. This means that you are unable to legally operate a vehicle until the suspension is lifted.

To regain your driving privileges, you will need to address the reason for the suspension, pay any applicable fines or fees, and provide proof of financial responsibility to the proper authorities.

If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________ is an excellent option.

Answers

This question, in it's raw form suggests that it is about information security -  in this case, password. There are several ways to make the password more challenging to hack. It's either make it encrypted or make/own a key-gen or key generator.

Key generator -  a key generator generates random characters which can be used as a password. It's effectivity lies on the number of characters used.

The answer for this question is none other than: Key-gen or key geneator.

A ____ is an area in ram or on the hard drive designated to hold input and output on their way in or out of the computer system.

Answers

A buffer is a region in RAM or on the hard drive assigned to hold information and yield on their way in or out of the framework. In computer science , an information cushion or simply support is a zone of a physical memory stockpiling used to briefly store information while it is being progress starting with one place then onto the next. However, a buffer might be utilized while moving information between forms inside a PC.

The CPU is referred to as the ______ of the computer.

Answers

The CPU, often likened to the brain of the computer, is responsible for running instructions and processing tasks within a computer system. It contains various parts that work in conjunction to execute and manage all the operations necessary to run programs.

The CPU is referred to as the "brain" of the computer. This is because it acts as the heart of the computer, running the software we write (also known as the processor). The CPU's role is to constantly process the next task - it operates at a rate measured in Gigahertz, so a 3.0 Gigahertz CPU can process three billion tasks per second. Inside the CPU, there are several components such as the Program Counter (PC), Instruction Register (IR), Instruction Decoder, Control Unit, Arithmetic Logic Unit (ALU), Registers, and Buses. The PC tracks the next instruction to load, the IR holds the instruction once fetched, and the Instruction Decoder breaks down the instruction for the Control Unit. The ALU performs arithmetic and logical operations while the registers hold data and instructions at various stages of processing. Buses within the CPU facilitate data transfer among these components, making it the main area where all computing and processing happens.

To create a public synonym, the user requires this privilege:

Answers

To create a PUBLIC synonym, you must have CREATE PUBLIC SYNONYM system privilege. 

Client/server networks are controlled by a central server that runs specialized software called a(n) ________.

Answers

The answer to this question is a network operating system. A network operating system or NOS is a computer operating system that supports the computers when it is connected on a local area network and it also helps in sharing data and information in other computers thru a network.  

Where does gateway antivirus scan for viruses

Answers

Gateway antivirus scan for viruses at the application level. Gateway antivirus allows for the checking of files for viruses by providing a web-based scanning service. It provides integrated antivirus security on the system which block the potential threat before reaching the network.

Which element of the word program window contains buttons for saving a document and for undoing, redoing, and repeating a change? status bar quick access toolbar title bar home tab?

Answers

The answer is the Quick Access Toolbar. However, it is not only for saving files or undoing your work. Containing a set of commands that are independent, this toolbar is actually customizable wherein you could change these icons to the ones you really need and frequently use. By tweaking the settings, you can even add commands to the Quick Access Toolbar that are not in the ribbon (like New, Open and Print).

The element of the word program window containing buttons for saving a document and for undoing, redoing, and repeating a change is the quick access toolbar. The correct option is b.

What is the quick access toolbar?

The Quick Access toolbar, which has buttons for saving a document and undoing, redoing, and repeating a change, is located on the left side of the title bar. In Microsoft 365 programs, the toolbar is normally hidden beneath the ribbon, but you can choose to reveal it and move it to appear above the ribbon.

The icons on this toolbar can be changed to reflect the ones you actually need and commonly use. You can also add Quick Access Toolbar instructions that are not in the ribbon by adjusting the parameters.

Therefore, the correct option is b, the quick access toolbar.

To learn more about the quick-access toolbar, refer to the link:

https://brainly.com/question/17441291

#SPJ6

What containsthe computers brain the central processing unit (cpu)?

Answers

Central Processing Unit. The CPU (Central Processing Unit) is the part of acomputer system that is commonly referred to as the "brains" of a computer. TheCPU is also known as the processor or microprocessor. The CPU is responsible for executing a sequence of stored instructions called a program.

You can separate words in a macro name by using the ____ character

Answers

You can separate words in a macro name by using the underscore character.

A macro is considered as a small reusable computer program. It is efficient as it helps you save time by automating any repeated task.
In order to create a macro, you do not need to be an expert in programming, however, a little knowledge about it will help.

A macro is a fragment of code which has been given a name. The name of a macro is a unique string that begins with a letter or a @, #, $, _ symbol. You can separate words in a macro name by using the underscore character. This character tells  that the current statement isn't finished yet and it continues on the next line. So, it's used to split a single line of code over two lines.

A prosthetic device is being coded on an electronic transaction. which code set should be used?

Answers

The Healthcare Common Procedure Coding System (HCPCS) should be used for coding of a prosthetic device on an electronic transaction. HCPCS is a code sets, used to code medical items such as medical supplies, orthotic and prosthetic devices, and durable medical equipment and is based on the American Medical Association's Current Procedural Terminology (CPT).

Implement a function that meets the specifications below.

def max_val(t):
""" t, tuple or list
Each element of t is either an int, a tuple, or a list
No tuple or list is empty
Returns the maximum int in t or (recursively) in an element of t """
# Your code here
For example,

max_val((5, (1,2), [[1],[2]])) returns 5.
max_val((5, (1,2), [[1],[9]])) returns 9.
Paste your entire function, including the definition, in the box below. Do not leave any debugging print statements.

Answers

Final answer:

The 'max_val' function recursively finds the maximum integer in a tuple or list, which can contain nested lists or tuples. The function traverses all elements and sub-elements, updating the max_value when a larger integer is found.

Explanation:

To solve the problem given by the student, we need to write a recursive function that traverses through the tuple or list and finds the maximum integer value, whether it is directly within the tuple/list or nested inside another tuple/list. Here is how we can implement the said function:

def max_val(t):
   """ t, tuple or list
       Each element of t is either an int, a tuple, or a list
       No tuple or list is empty
       Returns the maximum int in t or (recursively) in an element of t """
   max_value = None
   for element in t:
       if isinstance(element, (list, tuple)):
           value = max_val(element)
       else:
           value = element
       if max_value is None or value > max_value:
           max_value = value
   return max_value

The function starts with setting max_value to None, then it iterates through each element in the given tuple or list. If the element is a tuple or list itself, it calls max_val recursively to find the maximum value within that sublist/tuple. Otherwise, it treats the element as an integer and compares it to the current max_value. At the end of the function, the highest integer found is returned.

A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications.

Answers

The answer to this question is a firewall. A Firewall is a network security system that blocks and prevent unauthorized use or access of company’s network. Firewall is also a program that screens and restricts viruses and other users like hackers to reach the network through the internet. 

In windows xp, which control panel icon should you choose if you would like to customize your system for left-handed use?

Answers

Hello,
Once you’ve opened the Control Panel click on: the Mouse icon. Aslo you could click on: the Accessibility icon to setup your system for left handed use.

I hope this helps you out. If you need any more computer help, your more than welcome to contact me at:
helpdesk2572@comcast.net

In Windows XP, which Control Panel icon should you choose if you would like to customize your system for left-handed use?  

   

  A. Keyboard

  B. Regional and Language Options

  C. Add or Remove Programs

  D. Mouse

The correct answer is D. Mouse

How to make the background bigger in photoshop?

Answers

Go to canvas size and change the lengths and everything

Answer:

2 Ways

Explanation:

Option A is to make the document bigger when starting, or if you want to zoom in or out on your canvas then hold down alt and scroll up or down on your mouse.

Which network type connects each computer and device to a central device?

Answers

Answer: a Star NetNetwork Topology

Write the definition of a class counter containing: an instance variable counter of type int, initialized to 0. a method called increment that adds one to the instance variable counter. it does not accept parameters or return a value. a method called getvalue that doesn't accept any parameters. it returns the value of the instance variable counter.

Answers

class Counter
{
   private:
      int counter = 0;
   public: 
      void Increment() { counter++; }
      int GetValue() { return counter; }
};


What does most recent date of access mean?

Answers

Answer:

Explanation:

Date of Access. When creating a Works Cited citation for a website, the date you accessed the material should be included. Date of access is listed day, month, and year and is included at the end of the citation. Example: Antin, David.

The most recent date of access means the latest date at which any particular type of document or journal is accessible to the user.

What does the last access date mean?

The last access date means the specific date at which the records that have been terminated or restricted become generally available for use by the public. A timestamp that is typically associated with a file indicates the last time the file was viewed.

The portion of a bibliographic citation for a website indicates when the page, as cited, was known to be current. The date of Access indicates the date at which a specific type of document is framed. This creates works cited citations for a website. This last date of access or simply the access date is not a required element in your citation.

Therefore, the most recent date of access means the latest date at which any particular type of document or journal is accessible to the user.

To learn more about Accessing documents, refer to the link:

https://brainly.com/question/15011347

#SPJ2

. The toasting cycle of an automatic toaster is started by A. pushing the bread rack down. B. pushing the start button. C. turning on the built-in switch. D. setting the thermostat knob.

Answers

In order for the toasting cycle of an automatic toaster to start, the bread rack should be pushed down.

Answer: A 

Hope that helps! ★ If you have further questions about this question or need more help, feel free to comment below or leave me a PM. -UnicornFudge aka Nadia
D. setting the thermostat knob.

What are some examples of objects by which you can browse in the Select Browse Object options?

Answers

Here is the list of objects which you can browse using the Select Browse Object option: 

Edits 

Heading 

Table 

Graphic 

Field  

Footnote 

Endnote 

Comment 

Section 

Page 

This is a new feature of Word which allows the user to look at the document in different ways.

pages, graphics, comments, sections, and tables

Which type of software must include the source code, which allows programmers to modify and improve the software?

Answers

Hi there, 

The Open Source software type is the one that includes the source code and let the community improve the software's functionality.

Please check here in order to get a proper idea:
https://en.wikipedia.org/wiki/Open-source_software

Regards,
Alex

How many buttons does a gamecube controller have?

Answers

a gamecube has 11 different buttons on a controller.

Answer:

6

Explanation:

Software that enables you to display and interact with text and other media on the web is a web ________.

Answers

It's a web site or web page

Quiz 2: a _____ is any computer that provides services and connections to other computers on a network.

Answers

The answer could be "server"

Which technology uses regular phone lines and transmits at speeds up to 256 kbps?

Answers

I am completely sure that technology which uses regular phone lines and transmits at speeds up to 256 kbps is called Integrated Services Digital Networks or ISDN which are faster than dial up connection and allows to use a telephone line simultaneously. It's the first fixed broadband wireless connection 
Broadband refers to a high-speed Internet transmission (usually 256Kbps and above) featuring a permanent connection. The most common ways of getting online with broadband are via your TV cable box, your satellite or via your phone line. Cable TV is an easy option, but the most common type of broadband access is through an upgraded home telephone line called ADSL (Asymmetrical Digital Subscriber Line). ADSL is always connected so needn't be dialed up each time, and you can make phone calls on the same line while it's being used.

All gasoline inboard engines must have a backfire flame arrestor on each carburetor. what does this device prevent

Answers

All gasoline inboard engines must have a backfire flame arrestor on each carburetor. This device prevents the ignition of gasoline vapors in case the engine backfires. The backfire flame arrestor must be checked regular, be in good condition and be approved by the United States Coast Guard.

"using this type of communications channel, several users can simultaneously use a single connection for high-speed data transfer."

Answers

Broadband is a communication channel in which several users can simultaneously use a single connection for high-speed data transfer. The broadband communication channel has wide bandwidth, which means that it can transport data with high rates.  It is referred as high-speed Internet access and provides data transmissions in different directions and by many different users.

To transfer data packets between two or more networks, a ________ is used.

Answers

To transfer data packets between two or more networks, a router is used. The router is a networking device that works on the OSI Layer 3 and is able to transfer and forward data packets between several networks. The router is capable of reading and using the source and destination IP address of the data packet, which defines the sender and the receiver of the packet. 
Other Questions
What was the purpose of corporate shareholder trusts that were created in the United States in the late 1800s The temperature of a chemical reaction ranges between 10 degrees Celsius and 50 degrees Celsius. The temperature is at its lowest point when t = 0, and the reaction completes 1 cycle during a 6-hour period. What is a cosine function that models this reaction?f(t) = 30 cos (pi/3) t + 20f(t) = 60 cos (pi/3) t + 30f(t) = 30 cos (6t) + 20f(t) = 60 cos (6t) + 30 In which 1976 case did the supreme court determine that prison officials have a duty to provide medical treatment to inmates since inmates are dependent on them to provide for their medical needs? Find the missing part of this equation How many moles of electrons are required to reduce one mole of nitrogen gas (N2) to two moles of nitrogen ions (N3-)? What is the slope of the line that contains the points (-4,2) and (6,-3) At a concert there needs to be at least 1 member of staff working for every 150 members of the audience. If there are 20 members of staff, how many people are in the audience? Its timed hurry lad Evaluate the logarithm log8 (32) A square is inscribed in the circle. A point in the figure is selected at random. Find the probability that the point will be in the part that is NOT shaded. The figure below is a square pyramid. Which of the following could not be a cross section in the figure?SquareRectangle that is not a squareTrapezoidIsosceles triangle Which amendment would make mandatory prayer before lunch illegal Kim's softball team is playing in the championship game. they are losing by a score of 171717 to 666. there are 444 innings to go. kim wants to know how many runs her team needs per inning to win the game if the other team does not score. (each run is worth 111 point.) Tommy and Zach are starting out at the same position. Tommy runs north at 3 miles per hour and Zach starts to run east 2 hours later at the rate of 4 miles per hour. How long until Tommy and Zach are 8 miles apart? Savings account A and savings account B both offer APRs of 7%, but savings account A compounds interest quarterly, while savings account B compounds interest semiannually. Which savings account offers the higher APY? A.Savings account A, because it has more compounding periods per year B. Savings account B, because it has fewer compounding periods per year C.Savings account A, because it has fewer compounding periods per year D.Savings account B, because it has more compounding periods per year @countonme123 @ganeshie8 A melody that serves as the starting point for a more extended piece of music is called a An outstanding composer of the notre dame school was How much is 1 foot line of quarters worth Problem 1:Fill in the blank in the following dialogue with the appropriate interrogatory word below. Con ________ estudias? Estudio con mi amiga Marta. A.dnde B.quin C.qu D.cmo A rectangle is 13 centimeters longer than it is wide. Its perimeter is 226 centimeters. What are the length and width? Which president was the most successful in foreign diplomacy? Explain. Eisenhower: Korean War Kennedy: Cuban Missile Crisis Nixon: Vietnamization Carter: Camp David Accords Steam Workshop Downloader