How does Google work, why does it work that way?

Answers

Answer 1

Answer:

Google uses automated programs called spiders or crawlers, just like most search engines, to help generate its search results. Google has a large index of keywords that help determine search results. ... Google uses a trademarked algorithm called PageRank, which assigns each Web page a relevancy score.

Answer 2

Answer: Google uses automated programs called spiders or crawlers, just like most search engines, to help generate its search results. Google has a large index of keywords that help determine search results. ... Google uses a trademarked algorithm called PageRank, which assigns each Web page a relevancy score.

Explanation: Google's algorithm does the work for you by searching out Web pages that contain the keywords you used to search, then assigning a rank to each page based several factors, including how many times the keywords appear on the page. ... Google references this index when a user enters a search query.

Hope this helps^^


Related Questions

Your company must reduce its electronic waste by 10 percent in the next year. What can the company do to meet this goals? A. Become more active on social media. B. Use sleep modes and other power management features for computers and devices. C. Print copies of email messages. D. Discard old laptops and cell phones.

Answers

Answer:

B

Explanation:

In the question it's clearly mentioned that " reduce its electronic waste by 10% " it means to reduce electricity consumption and in the given options option B suits best.

Power management is a portable computer service that allows users to adjust the amount of electrical power used by an underlying device while minimizing performance.

It permits the changing of gadgets in various ways, each with varying power demand aspects relating to system performance.Sleep mode is indeed an energy-saving mode that halts most computer activities. Any open documents and applications are relocated to system memory (RAM), and the machine also enters a low-power mode.In the coming year, your company should minimize its waste production by 10%. To achieve these goals, the business uses sleep modes as well as other power management capabilities on computers and devices.

Therefore, the final answer is "Option B".

Learn more about the opportunity cost:

brainly.com/question/11379685

Does computerization improve patients outcome

Answers

Answer:

Yes, computerization improves the efficiency of patient management in medical centers.

Explanation:

In the past, hospitals or medical could only attend to patients that are present in the premises of the institution. The filing of patients was all done manually and on paper, which needed lots of paper and physical storage for the patient files.

Now, patient files are digitalized and stored in remote web servers, from which a patient's record can be pulled from any location, and medical consultation can be done remotely using computer devices and its designated applications, for doctor-patient communication.

This provides patients with the needed treatment they need where ever they are, even with no physical access to health consultation.

Question 1
Which of the following would Java recognize as a String?
"%.*
i 8a
"4bout T!me"
O "word"
Question 2

Answers

Answer:

The answer is "4bout T!me" and "word"

Explanation:

In the given java program code, the two choices that are "4bout T!me" and "word" were correct, because it uses the double quote, and its example can be defined as follows:

Example:

public class Exa //defining class Exa

{

public static void main(String[] args) //defining main method

{

    String x ="4bout T!me";//defining String variable x and assign value

       String y ="word";//defining String variable y and assign value

 System.out.println(x+"  "+y);//print message

}

}

Output:

4bout T!me  word

The main disadvantage of using this device is its negative impact on network performance,resulting from the fact that any incoming signal on any of its ports is re-created and sent out onany connected ports.

a. Router
b. Switch
c. Bridge

Answers

Complete Question:

The main disadvantage of using this device is its negative impact on network performance, resulting from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports.

Group of answer choices

a. Router

b. Switch

c. Bridge

d. Hub

Answer:

d. Hub.

Explanation:

A hub can be defined as a layer one (physical) device used for connecting various network devices such as switches and routers in a local area network (LAN). It comprises of many ports which are used for connecting segments of a local area network (LAN). Hubs are generally considered to be unintelligent because when frames are received at a port, it is then copied to every other connected port on the network.

Hence, the main disadvantage of using a hub is its negative impact on network performance, resulting from the fact that any incoming signal on any of its ports is re-created and sent out on any connected ports.

he most important reason study habits are necessary is so students can become more popular. have academic success. improve social skills. have time for sports.

Answers

Answer:

academic success

Explanation:

studying is for your school. your welcome.

The most important reason why study habits are necessary is that students have achieved improved social skills. Thus, the correct option for this question is C.

What is the significance of study habits?

The significance of study habits is determined by the fact that increase your confidence, competence, and self-esteem. They can also reduce anxiety about tests and deadlines.

By developing effective study skills, you may be able to cut down on the number of hours spend studying, leaving more time for other things in your life.

Consistency is key when it comes to studying, so do your best to make a habit of it! It's a good idea to find a spot on campus where you feel comfortable and inspired to dive into a successful study session.

In modern times, the main objective of study habits is to become social and work for society in such a way that enhances each and every character and aspect of that.

Therefore, the most important reason why study habits are necessary is that students have achieved improved social skills. Thus, the correct option for this question is C.

To learn more about Study habits, refer to the link:

https://brainly.com/question/18949374

#SPJ6

Jemima has finished formatting her main headings. She now wants to format her two subheadings. She wants to apply the format of her first subheading, not the format of the main heading, to the second subheading. Which feature of Word would help her to complete this task efficiently? the Styles task pane the Replace task pane the Format Painter feature the Copy and Paste feature

Answers

Answer:

C. format painter

Explanation:

Answer would be C, I guessed it and got it correct.

Which tab do you select to execute Mail Merge option?​

Answers

Answer:

I don't know if you are not the intended recipient, you can get it right away and we are a couple days, so I'm sure it was the only one that has

Explanation:

uueej, but it was the only one that is a great way. . . . . , and then you have a lot more to do. . the other side, but the most of us who we were all very

In the context of IT jobs in the information systems field, a ____ is typically responsible for providing network and cybersecurity.

Answers

Answer:

Network Administrator or Network Security Engineer

Explanation:

This seems like an excerpt from a textbook or article, but in the workplace, usually, the network administrator or a network security engineer are responsible for providing network and cybersecurity resources.

Why is digital data, at the base level in computers, represented in binary? * 10 points 0's and 1's are the easiest numbers to deal with mathematically. Using decimal or hexadecimal instead would change the meaning of the underlying data. A system with only 2 states is the most efficient way to organize data in a computer. Because other number systems do not allow you to represent both numbers and letters.

Answers

Answer:

The representation of the digital data in the computer system in the binary form because it is easier and cheaper to use in the system. It is more reliable to build the machine and the devices for distinguish the binary states.  

Computer basically uses the 0 and 1 binary digits for storing the data in the system. The computer processor circuits are basically made up of the various types of transistors that uses electronic signals for the activation process in the system.

The o and 1 are the binary digits that reflect the different states of the transistor that is OFF and ON state.

Your company has just opened an office in another state and you need the computers to communicate between the offices. What type of network should you create?

Answers

Answer:

WAN network

Explanation:

A WAN network is an abbreviation for wide area network. This telecommunication network is mainly used for networking computers. They are not tied to just one location. They can also be called network of networks. It connects several LANs. The lans stand for local area and networks and they are computer networks and devices that are connected to each other within a geographical area.

Which of the following is not a concern that has come out of the widespread adoption of the Internet?



Censorship of information


Increased anonymity


Selecting the correct browser to use for the sites you want to visit


Unauthorized sharing of copyrighted information

Answers

Answer:

The correct option is;

Selecting the correct browser to use for the sites you want to visit

Explanation:

Censorship of information is the subduing of information based on the consideration of such information being harmful or inconvenient

Increased anonymity

Making an individual anonymous which is one of the capabilities of the internet, is seen as encouraging unethical behavior and promoting discussions which are deemed uncivil in a commonly shared space online.

Unauthorized sharing of copyrighted information

The sharing and distribution of copyrighted material is against the law but it is a common occurrence and in various formats online

Out of the given options, selecting the correct browser to use for the sites you want to visit is the one that is not a concern.

CLS
INPUT "Enter your marks in computer": CS
C>40 THEN
PRINT "You are passed.
ELSE
PRINT "You are failed."
IF
END

DEBUG THE PROGRAM​

Answers

Answer:

INPUT "Enter your marks in computer";CS

IF C>40 THEN

PRINT "You are passed. "

ELSE

PRINT "You are failed."

END IF

Explanation:

see corrections above.

The Event Viewer(Microsoft windows) or console(apple Mac OS x) is used for what purpose?​

Answers

Answer:

it is used to view incidents recorded in the Application, Security, and System logs

Explanation: pls make my answer brainliest

Answer:

C) it is used to view incidents recorded in the Application, Security, and System logs

write a progrma in java to input a letter. If it is an upper case letter then encode it by next 5th letter,otherwise encode it with 3rd previous letter in the ASCII code​

Answers

BK Kaunas sa job I am b2k

Which troubleshooting utility allows generating DNS request messages and transmitting them to specific DNS servers on the network?

Answers

Answer:

nslookup

Explanation:

Which troubleshooting utility allows you to generate DNS request messages and transmit them to specific DNS servers on the network?

ans -nslookup

Do you think that people have a “right” to remain anonymous online? Why or why not?

Answers

Answer:

Yes

Explanation:

because everyones privacy should be respected

if an individual inserts a thumb drive containing classified information on a computer in the office that is not part of the classified information system, what type of security incident is this

Answers

Answer: Spillage

Explanation:

The type of security incident is  Spillage

Spillage security incident occur when sensitive data are moved into a computer system that does not have the permission to keep and process those sensitive data.

Therefore in a situation where Spillage security incident occur it is important to immediately access the locations where  Spillage occur and delete all the spill data from the computer system.

Inconclusion The type of security incident is  Spillage.

Learn more here:

https://brainly.com/question/14481551

what is the full form of DBMS​

Answers

Answer:

Database Management System.

Answer:

"Database Management System."

Explanation:

In short, a DBMS is a database program. Technically speaking, it is a software system that uses a standard method of cataloging, retrieving, and running queries on data.

Which file sharing client component intercepts requests for resources and examines it to determine whether the resource is local or remote?

Answers

Answer:

"Redirector " is the correct response.

Explanation:

Technology that routing desktop computers (clients) demand information to the computer within a LAN. The redirector software is introduced to the Computer in something like a Windows network that intercepts or captures requests for documents as well as printers, however if necessary, direct those to just the correct connected system.

Write a function silence (typecode, length) that returns a new data array containing all zeros of the given type code and length.

python programming

Answers

Answer:

Following are the code to this question:

import array as a#import package array  

def silence(typecode, length):#defining method silence that accepts two parameters  

   Val= a.array(typecode, [0]*length)#defining Val variable that stores zeros of the given type code and length

   return Val# use return keyword for return Val variable value

typecode = input('Enter typecode value: ')#use input method for input

length = int(input('Enter length value: '))#defining length variable that input integer value

print(*(silence(typecode, length)))#use print method to call silence method

Output:

Enter typecode value: b

Enter length value: 10

0 0 0 0 0 0 0 0 0 0

Explanation:

description of the code:

In the above-given Python code, Firstly we import a package that is the array, after that a method "silence" is defined that accepts two variables in its parameter that is "typecode and length". Inside the method, the "Val" variable is declared, which is used to calculate and store all zeros of the typecode and length variable. Outside the method, "typecode and length variable" is used for input the value from the user end-use the print method to call the function "silence" with an asterisk.

Jemima has finished formatting her main headings. She now wants to format her two subheadings. She wants to apply the format of her first subheading, not the format of the main heading, to the second subheading. Which feature of Word would help her to complete this task efficiently?

Answers

Answer:

the Format Painter feature

Answer:

the format painter feature

Explanation:

A _________________ operating system accepts random enquires from remote locations and provides an instantaneous response

Answers

Answer:

Real-time operating system (RTOS) are

Explanation:

Real-time operating system (RTOS) are operating systems that are meant for use with time sensitive applications and systems that have very strict time requirements such as in computers serving air traffic control systems, robot systems, or missile control systems.

The processing time for each process are in the order of tenths of a second or shorter time frames using given constraints.

Real-time systems are applied in life saving systems like parachutes or air bags so as to prevent injuries in the event of an accident.

What is the underlying complexity decimal numbers were used to represent. How were decimal numbers helpful in designing a system to represent text in bits?

Answers

Answer:

The underlying complexity decimal numbers were used to represent are bits, the decimal numbers were helpful in designing a system to represent text in bits because it is easier to read and it separates different texts.

Explanation:

All of the following are basic functionality provided by e-commerce merchant server software except: Question 22 options: A) productivity software. B) a product catalog. C) a shopping cart. D) credit card processing.

Answers

Answer:

The correct answer is option A "productivity software"

Explanation:

An e-commerce merchant server software is a software that enables sales exclusively over the Internet. It is a software that connects to a company server with the aim of allowing sales of the company's products to take place over the internet. Here, sales are capped with customers even paying for what they purchase online.

A product catalog in an e-commerce merchant server software shows lists of essential products that buyers can purchase online. These lists include product features, price, color, brand, size, and so many other examples.

A shopping cart is some sort of functionality in eCommerce software used to collect the items potential buyers select online with the aim to make it easier for the buyers to see all the items selected after shopping, make necessary adjustments if need be before payment.

Credit Card processing allows e-commerce merchant server software make buyers get card payment options to get their payment processed. In the authorization stage, the merchant must obtain approval for payment from the issuing bank. Some banks would require their client to activate this payment option with them at the bank before such clients are allowed to do e-commerce payments.  

The correct answer is productivity software because it is a software used for producing information that shows the productivity of a particular group, persons. In other words, productivity software can help produce things that simplify productivity they include worksheets, graphs, digital videos, and so many other examples.

which of the following would be considered a career in communication? Select all that apply. A actor B author C editor D journalist​

Answers

Answer:

1. The answers are B and D

2. The answer is A

3. The answer is A

4. The answers are C and D

authoreditor journalist

Are the answers to this question.

A career in communication involves the use of professionals in mass media to to pass messages across to an audience.

Professionals in media work with different companies, organizations and businesses to do the jobs of  influencing and educating people or the intended audience about happenings, products and services and practices.

read more at https://brainly.com/question/13391998?referrer=searchResults

write a note on secondary storage​

Answers

Answer:  Storage devices are non-volatile devices. That means that when the power is removed from them, for example, when you switch your computer off, they retain their contents (unlike RAM, which is volatile – it loses its contents). You can then retrieve the contents next time you switch your computer on. Storage devices can be used to hold operating systems, applications and files, amongst other types of software. They are simply big suitcases – used only for storage. We have already seen that when you want to use an application kept on a storage device, it has to be moved to RAM before you can start using it. This applies to the operating system, your files and any other category of software. For this reason, RAM is sometimes known as Primary Memory whereas storage devices are often referred to as Secondary Storage devices.

Jack knows how to use word processors, spreadsheets, and presentation software. He also has a basic knowledge of hardware, software, and the Internet. Given this information, it can be concluded that Jack has _____ literacy.

Answers

Answer: computer literacy

Given the above information, it can be concluded that Jack has computer literacy.

What is Computer literacy?

This is known to be  defined as given knowledge and ability that a person has in the area of the use of computers and its related technology in an efficient manner.

Note that  Given the above information, it can be concluded that Jack has computer literacy.

Learn more about computer literacy from

https://brainly.com/question/20892559

#SPJ6

PLEASE HELP !!!!!!!!!!

An assignment my gaming and animations teacher gave me said to explain (insert game)’s objectives, operation, obstacles, and outcomes. I don’t know what an operation means here. Please help

Answers

Answer:

Operation means what does the game do? What is the purpose. If you press left arrow key what happens...etc. That is what operation is in "gaming" sense.

Hope i helped!

which part of the word application window should the user go to for "read the document"

Answers

Answer:

idk

Explanation:

As you begin to develop a software application, what is one of the most helpful tools to ensure a quality product?

variable processing chart

central processing output chart

syntax and tags chart

input processing output chart

Answers

Input processing output chart
Other Questions
The perimeter of parallelogram ABCD is 46 inches. What is DA?3 in.4 in. 8 in.19 in. plane XYZ does not contain point Z Sonographic findings of severe micromelia, decreased or absent ossification of the spine, macrocephaly, and micrognathia describe which one of the following conditions?a. Achondrogenesisb. Achondroplasiac. Osteogenesis imperfectad. Diastrophic dysplasia Which American socioeconomic class is impacted by scarcity?es-)A)the poorB)the rich0the middle classD)the poor, middle class, and the rich 456How can a decision impact others? How can prehistoric sites have geographic place? Nine times the sum of a number and 8 is equal to 7. Fill in the blank. 1-5=_9 Choose 1 answer: a < b >or c= The ruler who was best known for defending religious freedom and promoting tolerance wasO AkbarMehmed Il.Aubangzeb.Babur Jada applies two transformations to a polygon in the coordinate plane. One of the transformations is a translation and the other is a reflection. What information does Jada need to provide to communicate the transformations she has used? A substance has a volume of 20 ml and a density of 2.5 g/ml.What is it mass? A:0.125g ,B:8g, c:22.5g or D:50g if an object is moving with constant speed then its distance time graph will be a straight line. a) along time axis b) along distance axis c) parallel to time axis d)inclined to time axis. Looking to the past and incorrectly believing you can predict the future based on past knowledge or understanding is the definition of: This table shows the CTSOs that four high school students are involved in: A 2-column table with 4 rows. Column 1 is labeled Student with entries Elyse, Abin, Kendra, Angelica. Column 2 is labeled Current C T S O with entries T S A, F E A, D E C A, H O S A. Assuming the students continue down the same career path, which table shows the professional organization that each student would most likely be a part of in the future? RUN-ON SENTENCES, COMMA SPLICES, & FRAGMENTS. In the space, markS if the sentenceis punctuated correctly. If it is a run-on, mark it RO. If it is afragment, mark it F.If it is WRONG, correct it.1. Early in May, hummingbirds migrate through Mexico there are hundreds ofthem singing and flying from tree to tree.L2. If you like Polish music and pickles, you should come to the Polish Fest inBremond next year.3. Many new cars have fancy computer screens they are confusing sometimes.4. When we meet for dinner.5. Women sang the songs, men hummed the tunes.6. My sister and I shared a room. I couldn't wait to get my own.7. Driving down the dark road last night. help please !!! Really stuck Hiiiii, could one of you lovely's help me with my English? determine whether the given vectors are orthogonal parallel or neither. (a) u=, v= which value of x makes this equation true -5(x - 20) = 35 Q2. The probability that an individual who attended the fair and completed the entry form will win a prize is: