which search engine is used as a search engine for every web browser? Give two web browser name and describe them which search engine they use. And why?

Answers

Answer 1

That's Go.ogle.

Two famous web browsers present are

Ch romeMo zila Firefox.

Chr ome is known for efficiency and lots of ad shuttering + surfing through higher data usage and heavy n et traffic.

Where as Fire fox is comparatively faster , privacy at peak and surfing through compartively lower dat a usage

Answer 2

Answer:

go..ogle & Micr...osoft ed;.ge

Explanation:

i use go..ogle because its the default search engine so its already there unlike micr...osoft ed;.ge......


Related Questions

If you are interested in an occupation as an operating system administrator or software engineer, you also may benefit from certifications in networking, hardware, and the Internet. Group of answer choices True False

Answers

True

Explanation:

because in that field there are many things you need to learn and that includes mostly all of them, as an Operating system administrator you most likely need to know things revolving around the system such as the compatibility with the Hardware. And as an Software engineer you NEED to know if your software is even compatible with the new technologys or if there are any problems, the same goes to networking

feel free to correct me

Help ASAP this Answer is simple…

why is fair use important

Answers

Answer:

to ensure that the rights of the copyright holders are fair or balanced properly

Explanation:

hope this helps

CODEHS: WHY is it important to know the difference between div and span?

Answers

Span and div are both generic HTML elements that group together related parts of a web page. However, they serve different functions. A div element is used for block-level organization and styling of page elements, whereas a span element is used for inline organization and styling.

Which of these would you least expect to find at an fbla-pbl meeting?

planning a community service project

role-playing to develop leadership skills

students working on iste certification

working with local business leaders

Answers

role-playing to develop leadership skills

One sign of a virus infection is that available memory is less than what should be available. Group of answer choices True False

Answers

Answer:

[tex]True.[/tex]

Complete the sentences.
The ACCUPLACER exam is a diagnostic test that evaluates the students’ progress in a specific academic field. It is divided into sections that assess reading, writing, and mathematics skills. The
section tests students’ ability to solve problems related to algebra, trigonometry, and geometry. The
section tests how well the students can write. The
section tests the students’ knowledge about sentence structure.

Answers

Answer:

fiances

Explanations it just  is

When you collaborate or meet with a person or group online, it is called
1. cloud computing
2. social networking
3. text messaging
4.web conferencing

Answers

When you collaborate or meet with a person or group online, it is called  social networking.

What is social networking?

The term  social networking is known to be the act of meeting people online, interacting with them and even making friendship with them.

Therefore, When you collaborate or meet with a person or group online, it is called  social networking.

Learn more about  social networking from

https://brainly.com/question/1027666

#SPJ1

Android os is developed by​

Answers

Answer:

It is developed by G oogle

Explanation:

Android os is developed by G oogle. It launched in 2008.

John is using a spreadsheet program. He needs to select two cells that are non-adjacent to one another. He is currently holding down the "Shift" key while clicking on the two cells. Interpret John's mistake.

John is using a right click when he should be using a left click

John should be holding the "Alt" key instead of the "Shift" key

John is not making any mistakes

John should be holding the "Ctrl" key instead of the "Shift" key

Answers

Answer:

John should be holding down the "Ctrl" key instead of the "Shift" key.

Explanation:

"Ctrl" key must be held down when selecting multiple cells, not "Shift" key.

Hope this helps!

Answer:

John should be holding the "Ctrl" key instead of the "Shift" key

Explanation:

When should a user consider restoring the operating system.

Answers

A user can consider restoring the operating system if the programs or apps do not start properly or when they are hanging/freezing.

What is an operating system?

This is known to be a software that aids a computer's basic functions, such as working on tasks and others.

Note that A user can consider restoring the operating system if the programs or apps do not start properly or when they are hanging/freezing.

Learn more about  operating system from

https://brainly.com/question/22811693

#SPJ1

Enumerate at least 5 furnitures you would add to your house which would be practical and energy-saving.

Answers

Answer:1. Advanced house framing

Advanced house framing, also known as optimum value engineering, is a specific framing technique wherein a house is constructed using less lumber and waste. Advanced house framing saves energy by using less wood and more insulation. According to the U.S. Department of Energy, using advanced framing can lower material costs by $500 to $1,000 for a 1,200- to 2,400-square-foot house. It can also cut labor costs by 3-5% and annual heating and cooling costs by up to 5%.

2. Cool roofs

Cool roofs are designed to reflect sunlight and lower roofing temperatures. Cool roofs are made from a type of reflective material within roofing materials such as tiles, shingles, paint or other substances. This energy-saving technique is ideal for houses in warm climates where air conditioning costs are high all year around.

3. The right exterior doors

Choosing the right exterior door for a home should be a carefully thought-out decision. When you choose a door, you should first consider the doors' energy-performance ratings. This score lets you know how well each door does in preserving the energy in your home by trapping heat or cool air inside. Using this score to help you find the ideal door will also help you narrow down your selection and find an exterior door that best matches your taste, needs and wants.

4. Skylights

Skylights are often a feature that enters homeowners' mind when they think of improving their homes' energy efficiency. Skylights have many benefits, which makes them ideal for any home. Skylights improve houses' heating, lighting and ventilation. It is important to note that if you are considering placing skylights in your home, the U.S. Department of Energy recommends they be no larger than 5% of the floor area in rooms with several windows, and 15% of the floor area in rooms with minimal windows.

5. Window treatments

Boring curtains do more than drive your spouse crazy; they can actually help reduce energy costs in your home. By being specific in your choice of window treatments, you can reduce heat loss or keep cool air inside your home. Many factors determine window treatments' energy efficiency. For example, the type of material and color of the treatment are significant, along with how it opens and closes.

Explanation:

What could cause an external drive, like a usb flash drive, to not be recognized when plugged into a computer?.

Answers

The reasons for a flash drive being not recognized when plugged in are the drive can be corrupt or broken, the port of the computer may be broken.

What is a USB flash drive?

A USB flash drive is a drive is a small device that connect devices with computer or insert data to the computer.

A USB have capacity to hold data within, and the data can be transported to anywhere.

Thus, the reasons for a flash drive being not recognized when plugged in are the drive can be corrupt or broken, the port of the computer may be broken.

Learn more about USB flash drive

https://brainly.com/question/14144068

#SPJ1

analog computer are general purpose computer true or false ​

Answers

Answer:

false

Explanation:

Analog computers were widely used in scientific and industrial applications even after the advent of digital computers

Which automatic startup option should you choose when windows' startup fails immediately after installing a new driver but before you have logged on again

Answers

Answer:

last known good configuration

Explanation:

If you're having difficulties starting Windows, the Last Known Good Configuration, or LKGC for short, is a technique to get it started. It loads the drivers and registry data from the last time you began and shut down your computer successfully.

10.13 lab 10c: output range with increment of 5 write a program whose input is two integers. output the first integer and subsequent increments of 5 as long as the value is less than or equal to the second integer. you may prompt for the two integers as you wish; the prompt will not be included in the grading. ex: if the input is:

Answers

he program gives an output in increment of 5, if the first inputted integer is less than the second. The program written in python 3 goes thus

If “A” represents in binary 10011001, what will be the value of word “CAB”?

Answers

Answer:

01000011 01000001 01000010

Explanation:

You can convert to and from binary and the base-10 system typically used by humans. You can also convert to and from binary and hexadecimal where you need four digits of binary to represent one digit of hex. Converting to and from binary and octal is another possibility. It takes three binary digits to represent an octal digit. Binary 000 is octal digit 0.

Stories used to be told only by:

OA. digitally recording them.

OB. saying them aloud.

OC. writing them down.

OD. drawing them on paper.

Answers

Answer:

OB. saying them aloud.

Explanation:

In the olden days, materials like recording devices, pens or paper weren't invented, so people had to know stories by heart.

Given a sorted list of integers, output the middle integer. assume the number of integers is always odd.
ex: if the input is:
2 3 4 8 11 -1
(a negative indicates the end), the output is:
4
the maximum number of inputs for any test case should not exceed 9. if exceeded, output "too many inputs".
hint: first read the data into a vector. then, based on the number of items, find the middle item.
#include
#include // must include vector library to use vectors
using namespace std;
int main() {
/* type your code here. */
return 0;
}

Answers

integer userInput

integer i

integer mid

integer array(20) number

userInput = 1

for i = 0; userInput >= 0; i = i + 1

  if number[i] > -1

     userInput = Get next input

     number[i] = userInput

i = i - 1

mid = i / 2

if i > 9

  Put "Too many inputs" to output

elseif i % 2 == 0

  Put number[mid - 1] to output

else

  Put number[mid] to output

An employee at a large global firm is sending a document with sensitive information to a co-worker in another country. how should the contents of the document be protected?

Answers

The employee at a large global firm which is sending a document with sensitive information to a co-worker in another country can document the data with end-to-end encryption.

How document be protected?

There are many ways a computer file can be protected. The ways to protect the document are,

Using the cloud based secure file sharing sites.The protected view can be used to secure the contents of the document sending to another country.When the file is end-to-end encrypted between the employee and co worker, then no one can be seen the file in between.

Thus, the employee at a large global firm which is sending a document with sensitive information to a co-worker in another country can document the data end-to-end encryption.

Learn more about the data protection here;

https://brainly.com/question/4219149

#SPJ2

Carrie needs to keep a budget for her department. Each employee in her department sends her travel expenses. In cell, C2, C3, C4, and C5, she enters the total of each employee’s expenses. In cell B1, she enters the original amount of money the department was allotted for spending. What formula should she use to calculate the amount of money the department currently has?

=B1 -(C2+C3+C4+C5)
=B1-C2+ B1-C3+B1-C4+B1-C5
= (C2+C3+C4+C5)-B1
=(B1+C2+C3+C4+C5)

Answers

Answer:

(C2+C3+C4+C5)-B1

Explanation:

Answer:

=(C2+C3+C4+C5)/4

Explanation:

add all numbers together then div. by the total amount of numbers is how you get the average.

what are trends in GPS ? ​

Answers

Answer:

New Trends in GPS & Telematics in 2021 and Beyond - Rewire Security. Real-time location tracking systems for cars, vans, motorcycles, lorries, wired or plug & play options—battery-powered GPS tracking systems with magnets attached to flat metal surfaces such as containers.

Explanation:

What initialization vector (IV) do most weak implementations of the Wireless Equivalency Protocol (WEP) use

Answers

24 bits is an initialization vector (IV) which is used by most weak implementations of the Wireless Equivalency Protocol (WEP).

What is Wireless Equivalency Protocol (WEP)?

Wireless Equivalency Protocol (WEP) can be defined as a standard wireless protocol that is designed and developed to provide a significant level of security and privacy on 802.11b wireless local area network (WLAN).

According to the IEEE Wireless Fidelity (Wi-Fi) standard, 24 bits is an initialization vector (IV) which is used by most weak implementations of the Wireless Equivalency Protocol (WEP).

Read more on Wireless Equivalency Protocol here: https://brainly.com/question/13697151

#SPJ1

Which best describes how information is sent on the internet?

Answers

Answer:

a. The information is first sent via a Broadband for efficient transmission, and if not successful, only then it is resent via a Baseband that exists as a backup network as packets b. The message is first broken down into small packets before being sent, then they are

Explanation:

What are the real-life applications of coding? any smart person who can give this ans

Answers

Answer:

Coding is used for a ton of different things. It can be used to create websites, video games, and apps. It is also an essential part of artificial intelligence and machine learning. Coding is a way to create computer programs that have a sequence of instructions for the computer to execute.

Explanation:

A series of events that gets the computer ready for work is known as what?
soft boot
hard boot
boot loader
boot sequence

Answers

Answer:

Boot Sequence

Explanation:

Help me with this question asap please :)

Answers

Answer:

I think it's sequence as there is a pattern of connection in the words

Compare and contrast sources and types of credit, including costs and benefits of installment
credit, collateralized loans versus unsecured credit, credit cards, mortgages, auto loans, and
student loans.

Answers

Answer:

loan your mom

Explanation:

You are responsible for managing an internal FTP server. A user reports that files available on the server yesterday are no longer available. Where can you look to determine what happened to the missing files

Answers

To determine what happened to the missing files are file Transfer Protocol (FTP) access logs list file activity on FTP servers, including file deletions or renames.

What is a FTP server?

FTP is a File transfer protocol. It is a transfer of files from the client and the server on a computer network.

It is a basic thing in transferring or sharing files between two computer networks.

Thus, To determine what happened to the missing files are file Transfer Protocol (FTP) access logs list file activity on FTP servers, including file deletions or renames.

Learn more about FTP server

https://brainly.com/question/27610307

#SPJ1

you want to be able to restrict values allowed in a cell and need to create a drop-down list of values from which users can choose. which feature should you use?

Answers

The  feature to restrict values allowed in a cell and need to create a drop-down list of values from which users can choose in the above scenario is data validation.

What is data validation?

Data validation is a term that connote the act of monitoring the truthfulness and quality of source data before one can make use of it, importing or even  process data with it.

Note that The  feature to restrict values allowed in a cell and need to create a drop-down list of values from which users can choose in the above scenario is data validation as it ensure that users can make their own choice.

Learn more about data validation from

https://brainly.com/question/27138101

#SPJ1

what word makes this inappropriate????

Answers

Hm. Maybe it’s a glitch? Maybe it thought of something dirty? :/
Other Questions
What is similar between the shape and the character Dodecahedron? What is different about the way each uses its 12 faces? (c) Explain why a combination of ethnography andprototyping is usefulfor the requirements elicitation process PLEASE HELP ILL MARK BRAINEST!!!! What is an ordinary bill?don't spam. What is the value of the expression?Any help? Given that A, O & B lie on a straight line segment, evaluate obtuse AOC. The diagram is not drawn to scale. < AOC= This Diagram Shows a Regular Pentagon Which kind of tax is not a source of revenue for state or local governments?A: poll taxesB income taxesC estate taxes D property taxes What is the cot in the right triangle shown? Unfortunately, saving elephants had a negative economic effect on some people. In 1999, in response to pressure from business interests that were losing money because of the ban on the ivory trade, CITES allowed limited trade in stockpiled tusks. Ivory that already had been harvested from elephants could once again be bought and sold. But disaster for the African elephant followed. Poachers, or illegal hunters, rushed to kill more elephants. Many people had foreseen that illegal trading of ivory would flourish again if any trading at all were allowed. Following the CITES decision, African clephants died in large numbers. A 2014 New York Times editorial reported that approximately 30,000 to 35,000 African elephants were killed each year. Only a complete ban of the ivory trade can save the African clephant from extinction. Which type of logical fallacy appears in this excerpt? Post hoc fallacyCherry pickingFallacy of the single causeReversing causal direction The sum of three number is 99. The second number is 9 more than the first the third number is 4 times the second. What are you numbers? To insert a column without using commands in any tabs, a user can _____ -click and then click Insert Column.fill in the blank 8-math-math geniuses pls help!!!-pls check other questions as well thanks,! I REALLY NEED HELP ASAP! Can someone please help me quickly? Because it's due tonight at 5:30 pm An investment of $10,000 is invested for 6 years at r% pa compounded weekly. If the investment grows to $14320.44, calculate the value of r. Individuals with an active infection from a multidrug-resistant organism would typically require: A recipe calls for 1 cups of sugar and 1 cups of flour to make one batch of cookies. How much sugar and flour would it take to make 3 batches of cookies? A man who heavily smokes has developed lung cancer. The tobacco smoke has caused mutations in some of the cells in his lungs, making them unable to stop reproducing and dividing. He is worried that his children, none of whom smoke, may have inherited the lung cancer from him. Under what circumstances might his concern for his children be justified? If his smoking had already mutated the DNA in the cells in his lungs at the time his children were conceived, the mutations would have been passed to his children. If he inherited a mutation which made him more susceptible to lung cancer, it may have been present in some of the gametes he produced and passed to his children. If the mutation resulted from the duplication of a gene in his lung cells, his children would be at greater risk than if it were caused by a base pair substitution. If the smoke had caused multiple different mutations in his lung cells, it would be more likely that one or more of the mutations would be passed to his children. precaleasy one question. please help!! 100 points + brainliest .Locate Polestar And Different Types Of Constellation.