Which of the following is not a good practice for effective Internet searches? Search for specific keywords that define your topic Use quotation marks to search for exact phrases Be general in your search query to get as many results possible Use or - to include or exclude different topics

Answers

Answer 1

Answer:

Be general in your search query to get as many results possible


Related Questions

What is an IF statement used for?

Answers

The IF statement is a decision-making statement that guides a program to make decisions based on specified criteria. The IF statement executes one set of code if a specified condition is met (TRUE) or another set of code evaluates to FALSE.

The implementation stage of the SDLC is when the system is moved into operation where it can be used. What stage PRECEDES the implementation stage and what happens in this preceding stage

Answers

The stage that precedes the implementation stage of SDLC is testing and it involves checking the functionality of the system.

System design involves the process of determining an overall system architecture, which typically comprises the following:

Hardware.End users.Physical processing components.Software.Communication channel.

Generally, there are seven (7) main stages in the systems development life cycle (SDLC) model and these include:

1. Planning.

2. Analysis.

3. Design.

4. Development.

5. Testing.

6. Implementation.

7. Maintenance.

From the above, we can deduce that the stage which precedes the implementation stage of SDLC is testing.

During the testing stage of SDLC, a quality assurance (QA) expert checks the system to determine whether or not it is functioning properly before it is deployed for operation, which is where the system can be used.

Read more: https://brainly.com/question/20813142

A NAND gate is a type of logic gate that produces an output of false only when both of its two inputs are true. Otherwise, the gate produces an output of true. Which of the following Boolean expressions correctly models a NAND gate with inputs P and Q?
a. (NOT P) AND (NOT Q).
b. (NOT P) AND Q.c. NOT (P AND Q).d. NOT (P OR Q).

Answers

A NAND gate combines the NOT gate and the AND gate.

For inputs P and Q, the boolean expression for the NAND gate is c. NOT (P AND Q)

The NAND gate means:

NOT AND

Assume the inputs are x and y, then the formula would be:

NOT (x AND y)

In this case, the input variables are P and Q.

So, we replace x and y with P and Q, respectively.

The formula becomes NOT (P AND Q)

Hence, the correct expression is (c)

Read more about NAND gates at:

https://brainly.com/question/11178154

A web-based program that uses artificial intelligence techniques to automate tasks such as searches is called

Answers

A web-based program that uses artificial intelligence (AI) techniques to automate tasks such as web searches is called a: bot.

Artificial intelligence (AI) is also referred to as machine learning and it can be defined as a branch of computer science which involves the process of using computer algorithms to build a smart computer-controlled robot that is capable of automatically performing and handling tasks that are exclusively designed to be performed by humans or using human intelligence.

In the field of artificial intelligence (AI), a bot is an abbreviation for robot.

A bot is a web-based software program that assists an end user, or acts on his or her behalf, in the automatic performance of repetitive computer-related tasks such as web searches.

Read more: https://brainly.com/question/21656851

What would the objective of the game be?
What would the operation of the game be?
What obstacles would your players experience?
What outcomes would you like to see in the game?
What sorts of themes, lessons, or skills would you like to express through your game?
What kind of person do you think would enjoy playing your game?

Answers

Answer:

Fresh out of college, Barry the Bee (Jerry Seinfeld) finds the prospect of working with honey uninspiring. He flies outside the hive for the first time and talks to a human (Renée Zellweger), breaking a cardinal rule of his species. Barry learns that humans have been stealing and eating honey for centuries, and he realizes that his true calling is to obtain justice for his kind by suing humanity for theft.

When you begin designing a program, you work from a ____, a description of what your program should do.

Answers

Answer:

This is usually called a brief (you will also hear this in the design industry, as well as other places)

which scenario describes a function provided by the transport layer?

Answers

The scenario that best describes a function provided by the transport layer of the open systems interconnection (OSI) model is: C. A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.

OSI model is an acronym for open systems interconnection and it comprises seven (7) main layers, which typically starts from the hardware layers (layers in hardware systems) to the software layers (layers in software systems) and they include the following in sequential order;

Physical LayerData link LayerNetwork LayerTransport LayerSession LayerPresentation LayerApplication Layer

The transport layer accept data packets from session layer, breaks them into smaller units and then transmits (sends) them to the network layer, without any duplication of data.

In this scenario, a function provided by the transport layer of the open systems interconnection (OSI) model is transportation (transmission) of the correct web page (data) to the correct browser window (software application), especially through the use of source and destination port numbers assigned to the software application.

Read more: https://brainly.com/question/22883762

Your question is lacking the necessary answer options, so I will be adding them here:

A. A student is using a classroom VoIP phone to call home. The unique identifier burned into the phone is a transport layer address used to contact another network device on the same network.

B. A student is playing a short web-based movie with sound. The movie and sound are encoded within the transport layer header.

C. A student has two web browser windows open in order to access two web sites. The transport layer ensures the correct web page is delivered to the correct browser window.

D. A corporate worker is accessing a web server located on a corporate network. The transport layer formats the screen so the web page appears properly no matter what device is being used to view the web site.

Which tool was developed for packet flow monitoring and was subsequently included in Cisco routers and switches

Answers

Wireshark. It’s a free tool used to analyze packets.

with which type of satellite is there a propagation delay?

Answers

Geostationary satellites have a high propagation delay.

In Java, a reference variable is ________ because it can reference objects of types different from its own, as long as those types are related to its type through inheritance.

Answers

Answer:

polymorphic

Explanation:

An example of polymorphic reference, suppose you have 3 classes: Main, Product and SpecificProduct. If SpecificProduct extends Product this means it is a product class but with something else to complement.

Say you want to reference an object of product in the main class, you can do it the classic way:

Product pd = new Product();

Or you can do it polymorphic, like this:

Product pd = new SpecificProduct();

The program will accept just fine because SpecificProduct is extending Product. When you do it like this, we say the reference you made was a polymorphic reference

Who are the primary users of erp systems?.

Answers

Explanation:

resellers, partners, suppliers, and distributors.

Question 8 of 10
When is a table the most effective way to present information?
O A. When graphs are more expensive to create.
O B. When you want to show the parts of a whole.
O C. When you want to show how parts fit together.
O D. When you want to make many details available in an organized
way.

Answers

Answer:

C

Explanation:

Tables and figures are particularly effective when large amounts of information have to be presented and discussed in an effective way.

Answer:

D. When you want to make many details available in an organized way.

Explanation:

Lloyd works for a graphic design company. He needs a monitor that accurately represents colors. Lloyd's monitor recently failed, and you have been asked to purchase a new one. You have been asked to find a monitor with a fast pixel refresh rate, low energy consumption, and very accurate colors representation.

Required:
What types of display devices will BEST meet the requirements requested?

Answers

OLED simply stands for Organic Light-Emitting Diode. It is often regarded as a type of technology that uses LEDs in which the light is produced by organic molecules. The types of display devices will best meet the requirements requested OLED.

They are often regarded as organic LEDs that are used to produce display panels.

OLED displays are produced with a number of organic thin films between two conductors. It has a form of a simple design that has a lot of merits over other display technologies.

These technology are mostly used today in mobile devices as they give a better image quality.

Learn more from

https://brainly.com/question/14781150

poob bn vbyfcfgxfc jghjg jhgh

Answers

Answer:

Ploob was a monster employed at Horville's Hut of Horrors. He looked like a small green ball with a long tube-like nose and hair along his spine.

Explanation:

You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection to implement to address your concerns?
a. Require strong passwords in teh local security policy.b. Use cable locks to chan the laptops to the desks.c. Implement screen saver passwords.d. Encrypt all company data on the hard drives.

Answers

There are different ways to ensure safety of devices. The best protection to implement to address your concerns is to use cable locks to chain the laptops to the desks.

The use of laptop locks is as good as when compared to bicycle chain locks. One can do this by looking for a big, immovable object, such as one's desk, and thereafter you wrap the metal cable around it and then insert the lock into your laptop's lock slot.

With this, your computer becomes theft-proof.

Thia will give you piece of mind as you will not be restless anymore.

Learn more about Laptop security from

https://brainly.com/question/24956493

Question # 2
Multiple Select
Which of the following statements are true regarding feedback? Select 3 options.

-Feedback is used exclusively for marketing purposes.

-Feedback includes only the unsolicited opinions of customers.

-Feedback can be gathered from everyday activities, like support calls.

-The type of feedback gathered, depends on the phase of the project and the goals for the feedback.

-Customer surveys can be used to ask specific questions.

Answers

The statement that are true regarding feedback are:

c. Feedback can be gathered from everyday activities, like support calls.

d. The type of feedback gathered depends on the phase of the project and the goals for the feedback.

e. Customer surveys can be used to ask specific questions.

What are feedbacks?

Feedbacks are the return compliments or suggestions that are given by customers after taking any service by any company. The business updates its products in response to client input.

He requested input from his employer. According to the sensors' feedback, the computer adjusts. The microphone was providing some input to us. These feedbacks are important for the company or any other person to improve herself.

Therefore, the correct options are c, d, and e.

To learn more about feedback, refer to the link:

https://brainly.com/question/26994432

#SPJ2

The network or networks within an AS communicate with protocols as well; these are called generically __________.

Answers

The protocol that is used by network or networks within an autonomous system (AS) to communicate with each other is generically called: interior gateway protocol (IGP).

A network refer to a set of interconnected computer systems (nodes) and the relational ties linking the computer systems together, especially for the purpose of exchanging (transmitting) data electronically.

An autonomous system (AS) can be defined as a network or group of networks that are administered or managed by an individual or business firm while using a single set of management rules.

Generally, an autonomous system (AS) typically uses a single (one) Internet Protocol (IP) routing protocol.

In this context, the protocol that is used by network or networks within an autonomous system (AS) to communicate with each other is generically called an interior gateway protocol (IGP).

On the other hand, an exterior gateway protocol (EGP) is the protocol that is used by autonomous systems (AS) to communicate with each other.

Read more: https://brainly.com/question/20629962

_______________ is research in the design and the use of computer technology, which focuses on the interfaces between people and computers.

Answers

Answer:

______HUMAN- COMPUTER INTERACTION_________ is research in the design and the use of computer technology, which focuses on the interfaces between people and computers.

Explanation:

HOPE ITS HELP

PLEASE HELP ME

(b) When a computer systems RAM becomes full it can use virtual memory.
Explain what happens if the computer does not have any virtual memory.

Answers

Answer:

it won't be able to run

Explanation:

because computer runs on physical memory

If a computer does not have any virtual memory, the consequences of running out of physical RAM can be quite problematic.

When the RAM becomes full, the operating system relies on virtual memory as a way to supplement the physical memory shortage. Without virtual memory, the system would have no way to manage or accommodate the excess data that needs to be stored temporarily.

As a result, the computer would likely start experiencing severe slowdowns, freezing, or crashing when attempting to run applications that require more memory than is available.

In extreme cases, the system might even become unresponsive or display error messages indicating a lack of memory. Virtual memory acts as a safety net, allowing the computer to continue functioning by utilizing a portion of the hard drive as temporary memory storage when physical RAM is exhausted.

Without this essential feature, the computer's ability to multitask and handle memory-intensive tasks would be severely hindered.

Learn more about virtual memory, click;

https://brainly.com/question/30756270

#SPJ3

a write the result P*=++j where j is 24

Answers

Answer:

ang hrap nmn nyan

Explanation:

poede po

Technical security measures like anti-virus (anti-malware), firewalls, and keeping browsers up-to-date will:

Answers

prevent malware from old exploits

you need to use task manager to analyze memory utilization on a windows system. for example, you need to see how much system ram is currently in use and how much is available. click on the tab in task manager that you would use to do this.

Answers

Answer:

Performance tab

Explanation:

If you press on the performance tab you should be able to see how much memory is in use and how much is free. For example 50% or 8GB/16GB

RDP connection from outside the network to a server inside the network. Which network device will a network administrator MOST likely configure to allow this connection? Hub Switch Firewall

Answers

Answer:

Firewall

Explanation:

The firewall might block the Remote Desktop Protocol (RDP) connection. This is because hackers could use open connections to brute force passwords or control an infected computer. The firewall ensures that only authorised connections occur.

codehs python 4.7.6 Powers of Two
it says I'm wrong because I need

Answers

[tex]\huge\fbox\orange{A} \huge\fbox\red{N}\huge\fbox\blue{S}\huge\fbox\green{W}\huge\fbox\gray{E}\huge\fbox\purple{R}[/tex]

[tex]\huge\underline\mathtt\colorbox{cyan}{in attachment}[/tex]

Following are the program to calculate the power of two:

Program Explanation:

Defining an integer variable "i" that hold an integer value.Defining a for loop that checks "i" value in between 20, inside this it calculates power of two.At the last use print method to print its value.

Program:

i=1#holding integer value in i

for i in range(20):#defining a for that starts 1 to 20    

   i = 2 ** i#calculate power of 2 in i variable

   print(i)#print value

Output:

Please find the attached file.  

Learn more:

brainly.com/question/23170807

Read what is in the commets.

Answers

Answer:

I'm a little confused on what you are asking, could you please explain.

What do we call any element within a computer program, such as a computer game, which simulated decision-making based on algorithms defined by game designers and programmers?

non-player characters (NPCs)

artificial intelligence (AI)

avatar

roguelikes

Answers

Answer:

AI - Artificial Intelligence

Explanation:

help me.............

Answers

Answer:

Explanation:

Sure

10 toes? Is that what you asked?

5 oceans entirely in the world.

300 bones in a baby and 206- In an adult body

Ask what kind of pet the user has. If they enter cat, print "Too bad...", if they enter dog, print "Lucky you!" (You can change the messages if you like). Once this works, add other pets. (Iguana, Pig, Rabbit...)

Answers

Answer:

Explanation:

a = input("what kind of pet the user has")

if a == 'cat':

  print("Too bad")

elif a == 'dog':

   print("Lucky you!")

a steep reduction is memory available on the heap to the poiont where it is completly exhausted is known as a

Answers

Based on the information that is given, a steep reduction in the memory that's available is known as a memory leak.

A memory leak simply means a form of resource leak which occurs when a computer program manages memory allocations incorrectly in such a way that the memory that isn't needed anymore aren't released.

It should be noted that a memory leak is also a steady reduction in memory available on the heap to the point where it's exhausted. It can also be when an object that is stored in memory can't be accessed by the running code.

Read related link on:

https://brainly.com/question/25820385

A ______ error occurs when the program's grammar and punctuation is correct, but something happens to halt the program before it is finished.

1. Runtime
2. Syntax
3. Logical

Answers

Answer:

Logical error

Explanation:

Answer:

Runtime

Explanation:

The program stops execution before the end of the instructions has been reached. It is not due to poor grammar/punctuation which would be a syntax error. A logical error would be due to an error in the programmer's logic but would not cause the program to terminate abnormally. This is also not the case.

Other Questions
Yes No"Agents of the U.S. government have been finding those people and tracking down the bogus bills for just as long." How to find density of a gas. taughttaught /tt/verbpast tense of teach, meaning to show or explain how to do somethingtauttaut /tt/adj.pulled tightpourspours /prs/verbmoves in a continuous flowporespores /prs/verbstudies intentlyThe students were __________ that an accomplished scientist always _____ over the results of an experiment. Which homophones correctly complete the sentence?taught, pourstaught, porestaut, pourstaut, pores geometry help on 34 please help me with this please and thank you A cell accumulated damage to the majority of its nucleic acids. Is in unlikely to. What should we do for healthy? Psychosis includes all of the following EXCEPT: A. visual hallucinations. B. delusions. C. panic attacks. D. auditory hallucinations. how fast is a skater traveling in meters per second if they are moving at a rate of 5.6 mile per hour2.51m/s0.25 m/s14.24 m/s25.09 m/s Whats the gradient and y intercept for c and e and could u explain pls thx The Internet provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML. -4-32answer it please ok thanks Which of the following words is being signed in this video?AlwaysChipotleRightsSubway What is a real number. Suppose that the distance a car travels varies directly with the amount of gasoline it uses. A certain car uses 21 gallons of gasoline to travel 399 miles. How many miles can the car travel if it has 28 gallons of gasoline Determine which situation could NOT be an example of interspecific competition.A. Two organisms competing for food.B. Two organisms competing for a mate.C. Two organisms competing for water.D. Two organisms competing over territory. 2 numbers that round to 70. The sum of the two numbers is 136 hydrodistillation explain ???? Which organization worked for the rights of migrant farm workers?A. Congress of Racial Equality (CORE)B. Southern Christian Leadership Convention (SCLC)C. American Indian Movement (AIM)D. Student Nonviolent Coordinating Committee (SNCC)E. United Farm Workers (UFW) The Clark family bought 8 crates of eggs last week. Each crate had 12 eggs. Since then, they have eaten 28 of the eggs. How many eggs are left?