A(n) ____ search seeks specific information using keyword combinations.

A. targeted
B. open-ended
C. meta tag
D. natural language


Answer: A

Computer Science & Information Technology

You might also like to view...

The file extension for an Excel Macro-Enabled Workbook is .xltm.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When the records in a file are sorted in order from lowest to highest values, the records are in ____ order.

A. descending B. bubble C. ascending D. merged

Computer Science & Information Technology

You are tasked with securing a small network for a client in which the following requirements must be met: • If a user on the private network attempts to send confidential company information to an unauthorized entity, an alert should be triggered. • The private trusted network should not be accessible from the public untrusted network. • If attacks are coming from the external network, the system should detect and prevent malicious activity. • All incoming and outgoing email should be scanned for malware.    Which of the following would best meet the requirements of the client?

A. Implement a firewall. B. Implement an IPS. C. Implement a UTM appliance. D. Implement identity-based ACLs. E. Implement an IDS.

Computer Science & Information Technology

Calling a Web ____________________ is a way of sending and receiving information across the Internet.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology