Brian wants to conduct an online search using a certain phrase. He intends to use the words books that belong to the 1800s in his search. How should he use the word that in his search?

Answers

Answer 1

Answer:

He should use the at sign

Explanation:

I think its correct

hope this helps

if it does plz mark me brainliest

Answer 2

The search must only use one quotation mark or less.

What is quotation?

Quotation is defined as a method of referencing typographic or phonetic shapes by displaying examples, i.e., writing or speech that has those shapes. Quotes in computer programming might be text or other information. The text that is being printed to the screen, for instance, is frequently encircled by quotations in the print statement below.

There are a number of techniques to perform a more precise search using search engines; for example, employing specific characters makes it simpler to conduct advanced searches in a particular theme. You must include a phrase in quote marks if you want to search for it, for instance as it was entered. Ambiguity is removed by using a minus sign after the searched term since it tells to consider other meanings instead of that one.

Thus, the search must only use one quotation mark or less.

To learn more about quotation, refer to the link below:

https://brainly.com/question/1434552

#SPJ2


Related Questions

Which chart tools ribbon tab enables a user to apply a style to the selected chart?

Answers

Design is the chart tools ribbon tab that enable the user to apply a style to the chart selected.

Icmp (internet control message protocol) is a _______ layer core protocol that reports on the success or failure of data delivery.​

Answers

Icmp (internet control message protocol ) is a Network layer core protocol that reports on the success or failure of data delivery.

What is an online alternative to customers sending checks via mail?

currency exchange

Western Union

payment processor

Moneygram

Answers

An online alternative to customers sending checks through e-mail is: C. payment processor.

What is online banking?

Online banking can be defined as a type of technology that financial institutions use to offer its customers an opportunity to receive and send money through the Internet.

Some examples of online banking institutions include the following:

Western UnionPay-PalMoneygramPayment processor

Payment processor is an alternative online banking institution that enable customers to send checks through e-mail.

Read more on online banking here: https://brainly.com/question/2772610

Which is the most likely problem if your computer starts up​ slowly, has many unwanted​ pop-up advertisements, and unusual hard disk​ activity?

Answers

you have a virus you should download malwarebytes free it covers everything

To create a query string, you add a ____ immediately after a url, followed by the query string.

Answers

The answer is question mark (?).  To create a query string, you add a question mark (?) immediately after a url, followed by the query string.

The theft and/or destruction of information, resources, or funds via computers, computer networks, or the internet:

Answers

The answer is Cybercrime.  The theft and/or destruction of information, resources, or funds via computers, computer networks, or the internet is called Cybercrime.  Common types of cybercrime involve hacking, online scams and fraud, identity theft, etc.

What is a primitive?
A. A simple 2-D object such as a rectangle or circle
B. A simple 3-D object such as a cube, cylinder, or sphere
C. A rectangle
D. A sphere

Answers

Its A.  this one is so easy for me ;)  

The most commonly used video formats are the mpeg-____ format, the windows media audio/video format, and the audio visual interleave format.

Answers

The answer is mpeg-4.  The most commonly used video formats are the mpeg-4 format, the windows media audio/video format, and the audio visual interleave format.

The company database may be stored on a central database server and managed by a database adminstrator true or false

Answers

The answer is True.  The company database may be stored on a central database server and managed by a database administrator.  

WILL GIVE BRAINLIST IF ANSWERED RIGHT 1. An engine's _______ contains the cylinder block, the cylinders, the piston, the connecting rods, and the crankshaft assemblies. A. upper end B. lower end C. back end D. bottom end Student Answer: A Answer: Incorrect Reference: Section 2.1 2. Compression gases that get past the rings and into the engine crankcase are called A. compression gases. B. blow-by gases. C. gas leaks. D. intake gases. Student Answer: C Answer: Incorrect Reference: Section 2.2 5. Technician A says that the burning of the air-and-fuel mixture in the cylinder is called fuel activation. Technician B says that the basic function of the upper-end components is to control the flow of air-and-fuel mixture into the engine and the flow of exhaust gases out of the engine after combustion. Who is right? A. Both Technicians A and B B. Neither Technician A nor B C. Technician A only D. Technician B only Student Answer: A Answer: Incorrect Reference: Section 2.1 11. What is shown in the above figure? A. Compression ring 2 B. Cam-ground piston C. Compression ring 1 D. Oil control ring Student Answer: B Answer: Incorrect Reference: Section 2.2 17. What does the above figure represent? A. Cam-ground piston B. Piston offset C. Stroke D. Bore Student Answer: B Answer: Incorrect Reference: Section 2.2 19. Technician A says that the piston's most important function is to transfer the force produced by the burning air-and-fuel mixture into usable power. Technician B says that the piston size is used to help form a seal between the piston and the cylinder walls. Who is right? A. Both Technicians A and B B. Technician B only C. Technician A only D. Neither Technician A nor B Student Answer: A Answer: Incorrect Reference: Section 2.2 20. Which of these is the distance from the head of the piston (not including any dishes or domes) to the deck surface of the engine block? A. Piston Deck Clearance B. Rod Length C. Piston Compression Height D. Compression Ratio Student Answer: C Answer: Incorrect Reference: Section 2.2

Answers

first three are c b and d

What is shown in the above figure? A. Compression ring 2 B. Cam-ground piston C. Compression ring 1 D. Oil control ring

The correct answer D. Oil control ring

What functionality can a vulnerability scanner provide that a port scanner cannot?

Answers

Sending alerts when new systems are added to the network is the functionality that a vulnerability scanner can provide and a port scanner cannot.
port scanner allows testing of open ports and firewalls. It discovers open UDP ports on your target system by scanning with NMAP and by doing so it is the first step of a complete vulnerability assessment. 

Vulnerability scanners offer broader functionality than port scanners by identifying and testing for specific vulnerabilities and providing remediation recommendations, whereas port scanners only identify open or closed ports.

Both vulnerability scanners and port scanners are critical tools used in cybersecurity, but they serve different purposes.

Port Scanner

A port scanner, like NMAP, is used to identify open ports on a network. This helps in understanding the services and applications running on different systems within the network. However, its functionality is limited to scanning and reporting on open or closed ports, without providing in-depth insight into the potential vulnerabilities of the system.

Vulnerability Scanner

In contrast, a vulnerability scanner, such as Nessus or OpenVAS, goes a step further by not only identifying open ports but also actively testing the system for potential vulnerabilities. These scanners check for misconfigurations, missing patches, and security flaws that could be exploited by attackers.For example, while a port scanner may report that port 80 is open, a vulnerability scanner would analyze the web application running on that port to ensure it is not susceptible to known threats like SQL injection or cross-site scripting (XSS). Additionally, vulnerability scanners often provide detailed reports and recommendations for remediation, which port scanners do not.

________ are used in input, processing, and output operations that can help create more efficient programs as the data can be processed many times without having to be input again.

Answers

Functional requirements are used in input, processing, and output operations that can help create more efficient programs as the data can be processed many times without having to be input again.
The functional requirements define function/s of a system or its component. It describes what a software system should do.

A cracked tone ring will often cause what type of problem?

Answers

A cracked tone ring will often cause, False ABS actuation at low speed.

What type of address does IP protocol use to identify a unique network and host?

Answers

i believe the answer would be a MAC address

7. Do you believe the advantages of using Twitter as a news source (i.e. speed) outweigh the disadvantages (i.e. unreliability)?

Answers

Final answer:

The advantages and disadvantages of using Tw-itter as a news source need to be carefully considered, as the speed of information may outweigh the unreliability of the platform.

Explanation:

The question asks whether the advantages of using Twit-ter as a news source outweigh the disadvantages.

While Twit-ter can provide news quickly, it is important to consider the reliability of the information. Social media platforms like Twi-tter have been found to spread false information faster than the truth and can also influence people's opinions.

Therefore, it is essential to critically evaluate the credibility of the news shared on Twi-tter.

A Web _________ is an Internet-based computer that stores Web site content and accepts requests from browsers.

Answers

The answer is server.

In which setting would you be least likely to find a full-time A/V technician?

stadium

restaurant

concert hall

school

Answers

My first answer would be school.

The ipv6 address, 2001:0000:0000:3210:0800:200c:00cf:1234, can be shortened to __________.

Answers

The answer is : 2001::3210:800:200C:CF:1234   You can drop leading zeroes. 00CF becomes CF and You can remove one or more "hextets" of zeroes and replace with double colons (::).

You want to be able to access your home computer using remote desktop while traveling. you enable remote desktop, but you find that you cannot access your computer outside of your home network. what should you do?

Answers

Get a program for this perpose or perhaps get a new computer
hey 

get a app that well let u do it

What information would you find in the header of a transport layer pdu?

Answers

Window size is the information that you can find in the header of layer pdu transport.

You find that your mobile device won't load any apps. identify the choice that is not a likely cause.

Answers

You may have used all your data for the month. is the answer
you have used up all your data of the month 

TRUE/FALSE: In order to use an object in a program, its class must be defined.

Answers

Yes that is correct. True

Which group on the formulas ribbon contains a command that allows a user to create names for cells to use in a formula?

Answers

Defined Names is the group on the formulas ribbon that contains a command that allows a user to create names for cells to use in a formula.

The program used to create the file where you want to insert the object is called the ____.

Answers

It is called the OLE

The eiffel tower was made using this type of construction

Answers

The Eiffel Tower was created using Iron and a Latticework Construction. The Eiffel tower  is a wrought iron lattice tower on the Champ de Mars in Paris, France. It is named after the engineer Gustave Eiffel, whose company designed and built the tower.  The latticework construction supports its own weight. The strips of metal are crisscrossed as the tower is built, supporting itself as it goes up. 

A data ________ is the structure and organization of data which involves fields records and files

Answers

Data hierarchy is the structure and organization of data which involve files and field records.

The idea of supply and demand is based on the development of

business decisions in a thriving economy.
sufficient products to meet consumer wants.
governmental laws that regulate the economy.
business efforts to improve product appeal to consumers.

Answers

Answer:

The idea of supply and demand is based on the development of sufficient products to meet consumer wants.

Explanation:

In economic theory supply and demand explains the relation between price ,sellers and buyers of a resource.

If the demand increases and supply increases it dose not have any affect on price.

If demand increase and supply decrease it triggers an increase in price

If demand decrease and supply increase it triggers decrease in price.

Answer:

Business efforts to improve product appeal to consumers.

Explanation:

The idea of supply and demand is based on the development of business efforts to improve product appeal to consumers.In an economy, innovation plays big role. Things people didn't even know they needed exist and are now an important part of their lives.

Supply and demand is created because of the businesses efforts to create a need among the consumers and supply to fulfill those needs.

______ is a slow process that takes place in nature. (2 points)

Budding

Reproduction

Migration

Natural selection

Answers


Natural Selection.


♣Amaranthine

_____ provide the standards, syntax, statements, and instructions for writing computer software

Answers

Programming languages provide the standards, syntax, statements, and instructions for writing computer software.
It is a vocabulary and set of grammatical rules. These rules are used for instructing a computer or computing device to perform specific tasks and produce a certain output.

The ____ feature works behind the scenes, fixing common typing or spelling mistakes when you complete a text entry

Answers

The autocorrect feature works behind the scenes, fixing common typing or spelling misled when you complete a text entry.
Other Questions
If the -ing form of a verb is used as the main verb of the predicate, the auxiliary must contain a form of?1) be2) do3) have4) will5) none of these A rectangular pyramid has a volume of 210 cubic centimeters. Find two possible sets of measurements for the base area and height of the pyramid. What new way of studying the universe did Francis Bacon help to popularize? (1 point) The use of microscopes in science The method of inductive reasoning The method of deductive reasoning The use of a control group in experiments On this assignment could I write about a restaurant or hotel complaint or any suggestions would be greatly appreciated.(Write a letter of complaint. Follow the rules for a formal letter, and use the full block style. The complaint may be about anything you wish such as malfunctioning equipment, poor building maintenance, or destructive noises from a nearby business). Well give brilliance Before leaving her home, margaret makes sure that every electrical appliance is unplugged and checks that every window and door is securely locked. she checks everything 17 times according to a strict ritual that she has worked out. if she misses one window, door, or appliance, she must begin all over again. if she tries to skip any step of the ritual, she experiences unbearable anxiety. margaret is probably suffering from: Please I need to make a short essay about Elizabeth Proctor . CAN SOMEONE HELP ME PLEASE Why were austria's borders smaller after world war i than before the war? Part 1: dna replication 1st: original strand (a): complementary strand (b): 2nd: original strand (b): complementary strand (c): 3rd: original strand (c): complementary strand (a): questions: what are the base pairs for dna replication? where does dna replication take place? Which of the following is an example of a tax authorized under the Federal Insurance Contributions Act (FICA)?excise taxSocial Security taxtariffsgift tax WILL MARK BRAINLIEST IF RIGHT!!!Meg described four triangles as shown below: Triangle P: All sides have length 7 cm. Triangle Q: Two angles measure 55. Triangle R: Two sides have length 8 cm, and the included angle measures 60. Triangle S: Base has length 8 cm, and base angles measure 55. Which triangle is not a unique triangle? A) Triangle P B) Triangle Q C) Triangle R D) Triangle S Kendra is a lower-class american. she lives in public housing, did not finish high school, experiences lapses in employment, and has a hard time making financial ends meet. it is likely that she: Increased _____ is a physiological change associated with normal aging.a. activity of bone-forming cellsb. blood filtration ratec. heartburnd. cardiac output If cells from a carrot are removed and placed in a culture medium, they can develop into a normal adult plant. this demonstrates that carrot cells _____. see concept 20.3 (page 427) view available hint(s) if cells from a carrot are removed and placed in a culture medium, they can develop into a normal adult plant. this demonstrates that carrot cells _____. see concept 20.3 (page 427) retain all the genes that were in the zygote that developed into the original plant are undifferentiated as adult cells differentiate differ genetically at maturity differ as mature cells PLEASE PLEASE PLEASE HELP I REALLY NEED HELP PLEASE AND THANK YOU!!!!!How is freedom of speech protected and how you think it might be limited. Circular motion occurs only at or near earths surface true or false Coronary heart disease is caused by a buildup of plaque in the arteries that supply blood to the heart. when the flow of blood to the heart is restricted or blocked, the heart can be damaged due to a lack of oxygen. further, if a large piece of plaque buildup gets dislodged from an artery wall, it can get stuck in other arteries throughout the body, including arteries in the brain. for simplicity, let's assume that the artery is cylindrical with a radius of r. the flow rate of a viscous fluid is given by poiseuille's law q=(/8)(p/l)r4. Describe the hardship the Southern civilian population faced during the war. Write your answer in a full paragraph with a topic and concluding sentence. Help please The blood type A,B,AB,and O are results of ____ inheritance. A)multiple allelic B)Polygenic C)sex-linkedD)simple dominant Ben Cohen and Jerry Greenfield created a market demand for (A) inexpensive fashions (B) gourmet ice creams (C) chocolate chip cookies (D) designer shoes What was one effect of the six-day war, also known as the june war?