Search engines enable you to

Answers

Answer 1
Answer: Search engines are programs that enable a user to search and find content under the category that a user is searching for and related results. A search engine receives a users input that is typed from a keyboard and then analyses the words typed in and searches through the database through related context/results. If the words typed in is recognizable, it will bring up Websites/URLS of sites that are related to the content.

A search engine is not to be confused with a browser. While a search engine finds websites/content, a browser is a application or program that is the interface used to host search engines using HTML. Although to some degree, they overlap, they do not always.

For example: Google and Yahoo are search engines that looks up input received by a user while examples of a browser will be Opera, Internet Explorer, and Firefox (Mozilla Firefox)
Answer 2
Answer: Its like Bing, Google and Yahoo.
Locate web pages related to a specific subject.
Hope this helps you 

Related Questions

Why do pepole get there question answered in 5 munities but for me its 7 FREAKING DAYS!?question: https:///question/26929057
What is printed by the following program? var numApples = 10; var numOranges = 5; if(numApples < 20 || numOranges == numApples){ println("Hello, we are open!"); } else { println("Sorry, we are closed!"); } println("Sincerely, the grocery store");
The quote, "Where you tend a rose, my lad, a thistle cannot grow," referred to --- A. Dickon teaching Colin the correct way to plant and weed the rosebushes in the secret garden B. Colin learning to think positive thoughts instead of discouraging and fearful ones C. Mrs. Sowerby telling Mrs. Craven that Colin needed sympathy, love, and attention to improve D. Ben explaining that roses ruin the soil so that other plants cannot thrive
A(n) __________ describes a set of well-defined logical steps that must be taken to perform a task1. logarithm2. plan of action3. logic schedule4. algorithm
To complete a specific task in businesses , what software should I use?

Which of the following is used on a wireless network to identify the network name?

Answers

The service set identifier (SSID) of a wireless local area network is a group of characters that serves as a means of identification. Sometimes, SSIDs are referred to as "network names.”

What wireless network to identify the network name?

The header of packets carried over a Wireless Local Area Network contains a 32-character unique identification called the Service Set Identifier (SSID) (WLAN). When a mobile device tries to connect to the BSS, the SSID functions as a password.

When several networks run in the same physical location, this name enables stations to connect to the preferred network.

The group of Stations that may communicate with one another in an 802.11 network is referred to as the Basic Service Set. Access Points (APs) that offer a link onto a fixed distribution system, like an Ethernet network, may or may not be included in the BSS.

Therefore, Service Set Identifier (SSID) is used on a wireless network to identify the network name.

Learn more about wireless network here:

brainly.com/question/26651858

#SPJ5

you didnt provide the answers but i assume the answer you are looking for is the 

SSID .... (service set identifier)

Which options most accurately describe the information that should be included in note-taking? SELECT ALL THAT APPLYA) name
B) dates
C) key words
D) main ideas

Answers

I think: B,C,D. You do not need to write notes on a thing that you will only see, but you need a date, key words, and main ideas.
The information that should be included in note-taking are B,C and D. You don't need your name unless you are going to share your notes with anyone.

Do you need internet to play xbox one

Answers

Yes of cource because with out internet it wont work i tried it before

Common features of a thunderstorm are _____. thunder lightning rain or hail all of the above

Answers

All of the above
---------------------------------

All of the Above. We've all heard thunderstorms, so you know what some characteristics of them are. 

When the same default tracking code is installed on pages with different domains, what will result?

Answers

Answer:

When the same default tracking code is installed on pages with different domains, what will result?

Analytics will associate users and sessions with their respective domains

Explanation:

One of the first things you should know about when using and configuring Analytics is how the domain of the web property you are tracking is defined as a “site” for the purposes of viewing your reports. The default setup of the tracking code is designed to make it easy for you to track traffic to a single domain or subdomain (e.g. a single website URL) that does not share user data with other domains or sub-domains.

With which type of social engineering attack are users asked to respond to an email or are directed to a website where they are requested to update personal information, such as passwords or credit card numbers?

Answers

Answer:

Phishing

Explanation:

Phishing is a social engineering attack where users are asked to respond to an email or are directed to a website where they are requested to login with their personal credentials, such as passwords or credit card numbers.

How Phishing Works?

The attacker first carefully designs a web page identical to a real bank with fine details. Then attacker persuades the victim to go to this fake web page with login screen. The attacker gets all the information typed and enter into that fake web page. The victim often thinks that this is exactly my bank's web page so nothing is going to happen if I put log in credentials.

How to avoid Phishing?

This kind of attack can always be spotted with one simple trick. Check the address of the web page carefully. The attacker can design the web page according to his wish but he cannot have control over the web address of a real bank or real a website.  

Some general safety tips are:

  • Don't open links from spam emails.
  • Don't download malicious software.
  • Don't share personal information with strangers