1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivann1987 [24]
3 years ago
11

How to reply to text from unknown number?

Computers and Technology
1 answer:
Leto [7]3 years ago
5 0
Safest way: DO NOT reply and BLOCK number.

If you are not sure if the guy is related to some stuff, it will be better to call him back, instead of texting.
You might be interested in
What is a special class of adware that collects data about the user and transmits it over the Internet without the user’s knowle
Stells [14]

Answer:

The answer is "Spyware".

Explanation:

Spyware is a supplementary program that is mounted on your customer computer and it transmits the data without authorization via the Internet. Its business includes ads, private data, and improvements in the user interface, which is why it has become recognized as the special adware class that collects and transmits user information over the web without the user's permission.

7 0
4 years ago
"Hubs:
Butoxors [25]

Answer:

Hubs incorporate amplifiers and repeaters.

Explanation:

Hub is an outdated way of connecting ethernet devices, they incorporate amplifiers and repeaters, they do not allow simultaneous communication among connected devices.

The latest technology in connecting ethernet devices are with the use of switch.

7 0
3 years ago
On a printed circuit board, electronic components will be mounted from the
Likurg_2 [28]
On a printed circuit board, electronic parts will be mounted from the substrate side of the board. The leads jab through the substrate and the copper sheeting that has been carved. The leads are then soldered to the copper.

I hope the answer will help you. 
3 0
3 years ago
Which of the following is a way the operating system prevents unknown or unauthorized users from accessing the system?
Xelga [282]

Put a code or security system on or a very secure password

Hope this helps...

6 0
3 years ago
Read 2 more answers
Which of the following types of memory is used to load programs and transfer files during your work sessions? A. D-ROM B. RAM C.
hammer [34]
I believe the answer is B-Ram <span />
4 0
4 years ago
Read 2 more answers
Other questions:
  • Describe how to manage the workspace by putting each feature under the action it helps carry out
    8·1 answer
  • Explique si en la pc que se usa para hacer las tareas escolares se puede ver un video juego de los llamados “pesados”
    13·1 answer
  • PLEASE ANSWER THIS IM IN A QUIZ
    15·2 answers
  • science and technology are interdependent advances in one lead to advances in the other. give an example of this phenomenon.
    5·1 answer
  • For some reason, Danica's classmate George could not find the registered symbol in the symbol gallery. He is selling
    14·1 answer
  • Choose all the items that represent potential ways to find a job opening.
    14·1 answer
  • A computer scientist creates an app that tells you a funny joke each time you touch the Joke button.
    15·1 answer
  • 8.4 Lesson Practice <br> edhesive quiz
    12·1 answer
  • Text,Audio and graphic is entered into the computer using
    9·1 answer
  • What are the three main elements common to all radio ads?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!