1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimulka [17.4K]
3 years ago
12

A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c

oworker recalls there is a setting in the Internet Options dialog box to prompt the user before downloading ActiveX controls, but can’t remember which tab to use.
Which of the following tabs will you suggest to the coworker?

Security tab

Privacy tab

General tab

Programs tab
Computers and Technology
1 answer:
uysha [10]3 years ago
8 0

Answer:

Security Tab is the correct answer.

Explanation:

The Security Tab will enable the users to authorize anyone to use that file or directory.Many clients deleted the security tab because After that nobody can alter the security privileges on the device.

  • With the help of the Security tab, we will minimize the ActiveX attacks on Internet Explorer. This option is available in the Internet Options of the dialog box.
  • Other options are incorrect because they are not related to a given scenario.
You might be interested in
All of the following are helpful tips for protecting your digital privacy, except:
timurjin [86]

Answer:

B

Explanation:

Cookies are used to track visitors of websites

3 0
3 years ago
Read 2 more answers
For computer forensics, ____________ is the task of collecting digital evidence from electronic media.
Zanzabum

For computer forensics, <u>data acquisition</u> is the task of collecting digital evidence from electronic media.

<h3>What is data acquisition?</h3>

Data acquisition is the process of gathering digital evidence from electronic media for computer forensics. Static acquisitions and live acquisitions are the two different categories of data acquisition.

You learn how to carry out static acquisitions from digital material in this chapter. It is the process of digitalization of data from the world.

Thus, <u>data acquisition</u> is the task of collecting digital evidence from electronic media.

To learn more about data acquisition, refer to the link:

brainly.com/question/28233320

#SPJ4

7 0
2 years ago
.exe, .msi, .msp, .inf - together, what do these filetypes indicate
Katena32 [7]
.exe Indicates a windows executable file. These files are compiled in a variety of different programming languages and can accomplish a variety of tasks. .msi Files are database files that have pre packed dependencies, code, etc that is used by the Windows Installer to install a program package onto the host PC. .msp Indicates a Miscrosoft Patch file that may be used for patching or changing a program/firmware that pre-exists on the host PC. .inf Indicates an information file that is commonly used by programs/installers to outline the parameters for the program/installation to run. 
7 0
3 years ago
Read 2 more answers
True/False/Unknown. For the interpretation of function calls, we assign the formal parametersto the valuations of the actual arg
alisha [4.7K]

Answer:True

Explanation:Calling a Function.

A function is created by defining what that function needs to do. In order to utilize that function one has to do that task defined in that function. A called function is the one that carries on the defined task

Parameters need to be passed with the function name in order to call a function,the value returned by a function is then stored.

5 0
3 years ago
Write a loop that continually asks the user what pets the user has until the user enters stop, in which case the loop ends. It s
Nataliya [291]

Answer:

int counter = 0;
String userInput = "";
while (userInput != "stop") {
print "What pet do you have? ";
userInput = readInputLine();
if (userInput != "stop" ){
counter = counter + 1;
print "\nYou have one ";
print userInput;
print ". Total # of Pets: ";
print counter;
}
}

Explanation:

not sure what programming language you use, therefore the answer is pseudocode but it should give you an idea how to implement a piece of code for this problem.
Also, from the way you described the exercise I'm not sure if you always are supposed to reply with "you have one" + the pet or if you should count how often the same pet was entered.

6 0
1 year ago
Other questions:
  • What file would you edit to restrict the number of simultaneous logins a user can employ??
    14·1 answer
  • What is one course of action available in every problem solving process?
    9·2 answers
  • __________ is a protocol used by e-mail clients to download e-mails to your computer.
    14·1 answer
  • How can i turn on my prinfer without getting up
    12·2 answers
  • A character with the point size of 10 is about 10/72 of once inch in height
    8·1 answer
  • Which of the following is an accurate definition of a computer system? A computer system consists of the operating system that t
    6·1 answer
  • I will give brainliest!!!
    13·1 answer
  • When locating and correcting accessibility issues for a document, you would click what first?
    11·1 answer
  • Reesa works for a large real estate company. She is responsible for installing and supporting the company's internet systems, in
    5·1 answer
  • GRAND THEFT AUTO 5 LOLLL
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!