answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andre45 [30]
2 years ago
7

Which of the following queries can have a Fully Meets result? Select all that apply. True False [adobe website], English (US) Tr

ue False [country music], English (US) True False [hawaiian photographers], English (US) True False [new york times online], English (US)
Computers and Technology
1 answer:
Sphinxa [80]2 years ago
7 0

Answer:

a) [adobe], English (US) -False

b) (country music], English (US) -True

c) [hawaiian photographers], English (US) -False

d) [new york times online), English (US) – True

Explanation:

When we refer to fully meets, this implies that the result is fully satisfying to the user and the user gets the result of query specific,clear and unambiguous.

a) [adobe], English (US) -False

Explanation:

Here if user asks about adobe, then he/she can get different results like adobe company or maybe related to adobe software any tool. Hence, it does not fully meets results.

b) (country music], English (US) -True

Explanation:

Here if user search for query country music then he/she gets the result about he country music. Thus, it fully meets results.

c) [hawaiian photographers], English (US) -False

Explanation:

Here if a user looks for hawaiian photographers, then it does not properly provide the list or address or you can say the system does not understand what the user want. Thus, it does not fully meets results.

d) [new york times online), English (US) – True

Explanation:

Here if a user searches for new york times online, then it directly links to the newspaper new york times. Thus it fully meets to the results.

You might be interested in
Company A is setting up a network of mostly Windows machines. Which networking file system protocol would you recommend for maxi
maxonik [38]

Answer:

For maximum interoperability, NFSv4 is recommended.

Explanation:

When setting up a network of mostly windows machines, it is better to use NFSv4 because it includes performance improvements, mandates strong security, and a stateful protocol.

4 0
2 years ago
_______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.
Sergeu [11.5K]

Answer:

Rootkit.

Explanation:

Rootkit is a collection of software tools,mostly malicious.These are mostly used by hackers to obtain administrator permission to a computer by masking intrusion.

Root-kit is made from two word Root and kit.Where root refers to the name of privileged account on an operating system that is somewhat like unix and KIT refers to the tools used.

6 0
2 years ago
What answer best explains why improper netiquette is considered dangerous? Individuals who violate user policies are often charg
adell [148]

Answer:

Students become vulnerable to cyberbullying and harassment.

Explanation:

3 0
2 years ago
Read 2 more answers
Write the prototype for a function named showValues. It should accept an array of integers and an integer for the array size as
aalyn [17]

Answer:

void showValues(int [<em>maximum</em><em> </em><em>volume</em>],int);

4 0
2 years ago
Read 3 more answers
A corporation needs an operating system that allows the various teams in its office to network and collaborate on projects. Whic
maks197457 [2]
They would all work as they can all run on servers and be set up as networks. Microsoft is not an operating system it is a company that rights the windows operating system.
5 0
2 years ago
Other questions:
  • The adjusted cell references in a copied and pasted formula are called ____ cell references.
    7·1 answer
  • Jail and prison officials may generally limit inmate rights when the limitations serve
    13·2 answers
  • Which are methods used to improve reading fluency? Check all that apply. Practicing with a weak reader listening to a fluent rea
    5·2 answers
  • Select the correct answer. Rachel needs to make a presentation on ethics and etiquettes in college. She has about 30 minutes to
    13·1 answer
  • Which of the following is true about protected access?
    7·1 answer
  • Select the correct answer. James is a sales analyst of a departmental store chain. He checked the sale records for the past 12 m
    6·2 answers
  • When configuring a record type, an App Builder can configure the available value of a picklist field for the page layout. Which
    9·1 answer
  • Create the strAnalysis() function that takes 1 string argument and returns a string message. The message will be an analysis of
    15·1 answer
  • Write the notInVocab method. Assume that there are no duplicates in wordArray. You must call findWord and countNotInVocab approp
    10·1 answer
  • Jason Chang is creating photos of his restaurant for a new website. Some of the photos of the staff have red eye, others are bad
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!