1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kobusy [5.1K]
2 years ago
9

Is a practice that helps to prevent the download of viruses and other malicious code when checking your email?

Computers and Technology
1 answer:
Natalka [10]2 years ago
7 0

Do not access links or hyperlinked media such as buttons and graphics in email messages.

<h3>What is a best practice that can prevent viruses and other malicious code?</h3>
  • View email in plain text and don't view email in Preview Pane.
  • Using antivirus software is the best way to defend your computer against malicious code.
  • If you think your computer is infected, run your antivirus software program. Ideally, your antivirus program will identify any malicious code on your computer and quarantine them so they no longer affect your system

To learn more about malicious code, refer

to brainly.com/question/9143118

#SPJ4

You might be interested in
How do you use loops in code?
Keith_Richards [23]

Answer:

A loop in a computer program is an instruction that repeats until a specified condition is reached. In a loop structure, the loop asks a question. If the answer requires action, it is executed. ... A computer programmer who needs to use the same lines of code many times in a program can use a loop to save time

Explanation:

4 0
3 years ago
Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of
notka56 [123]

Answer:

The answer is "compromise"

Explanation:

In computer science, the comprised system is used to describe as any technological resource, that has been negatively affected by an untrustworthy source for nondisclosure, integrity or accessibility either deliberately or inadvertently.

  • In this, the mechanical interaction from the unauthorized source or technological progress can result in compromise.
  • This helps you and the partner to meet each other's interests by taking into consideration both the positions and the solution to the main problem.

4 0
3 years ago
Read 2 more answers
Write. A program to fine the difference of two number 25 and 17 . Also displays the output
Anon25 [30]

Answer:

Answer = 25-17

print("25-17", Answer)

Explanation:

You put the sum into a variable which in this case would be Answer and then you can output it with the question.

6 0
3 years ago
Fill in the black
iogann1982 [59]

Answer:

information processing is concerned with recording arranging processing retrieving and disseminating of information

4 0
3 years ago
How can you create a safe and secure password? Choose a password unassociated with your personal history. Choose the same passwo
Simora [160]

Answer:

sudoors787389

Explanation:

in other to get more secured password a combination of password like this will be more secured (sudoors787389)

8 0
3 years ago
Other questions:
  • The picture that graphically represents the items you use in Windows is called a/an
    12·2 answers
  • Which of the following parameters should match in order for a pair of routers to form an adjacency when running OSPFv2? (Points
    9·1 answer
  • In a flow chart, both the decision structure and the repetition structure use the diamond symbol to represent the condition that
    9·1 answer
  • When command is transferred, the process should include a(n): A. Detailed Lesson Learned Report B. Intelligence Report C. Award
    11·2 answers
  • ____ is a real-time Internet communications service that notifies users when one or more people are online and then allows them
    10·1 answer
  • Quienes son el proyectista y el director de obra en una ICT
    6·1 answer
  • Fill in the blank
    15·1 answer
  • What does this mean?​ pls help me
    12·1 answer
  • Write a c++ program which has array in fifteen element sort the array by selection the search for in element using binary search
    14·1 answer
  • Input header here<br>input paragraph 1 here
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!