Search engines use programs called ________ to crawl the web and gather results

A) spiders B) worms C) snakes D) horses


A

Computer Science & Information Technology

You might also like to view...

Match each term with the correct statement below.

A. an encrypted alternative to the Telnet protocol that is used to access remote computers B. using wireless technologies for asset tracking of wireless equipment C. device in an IEEE 802.1X network that makes an appeal for access D. a method for auditing usage by using an algorithm to determine if a threat exists E. a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated F. a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected G. an encryption cipher that takes one character and replaces it with another character H. dynamically generating a new key for each packet to preventing collisions I. providing access based on a user's job function within an organization J. a device in an IEEE 802.1X network that accepts or rejects a supplicant

Computer Science & Information Technology

A(n) ________ separates a new field name from the expression for the new calculated field

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ________ view displays a structural view of a document that can be collapsed or expanded

Fill in the blank(s) with correct word

Computer Science & Information Technology

What symbols are used in Publisher to indicate where a merge field has been entered?

A) Double angle brackets - <<>> B) Single angle brackets - <> C) Single straight brackets - [] D) Double straight brackets - [[]]

Computer Science & Information Technology