1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vaselesa [24]
4 years ago
6

All of the following activities may infect your computer with a virus EXCEPT ________.

Computers and Technology
1 answer:
pochemuha4 years ago
3 0
<span>Installing the manufacturer's printer driver will not lead to a virus, in most cases. If the file being used for the installation comes from the manufacturer's website or compact disc, then the odds of receiving malicious software is so low as to be almost zero.</span>
You might be interested in
You can print powerpoint presentation handouts with up to ____ slides per page.
Ierofanga [76]
You can print up to 9 slides per page.
3 0
4 years ago
A troubleshooting strategy that removes components from a system in order to get back to a basic configuration is called module
Semmy [17]

Answer:

B. False.

Explanation:

Troubleshooting strategy is a technique used to discover the cause of defeat in a system. The technician must learn to improvise with these strategies to solve a system problems.

Module replacement is a type of troubleshooting strategy that replaces a component with unknown status with another component with good status to determine the cause of the problem.

Removing a component from a system to get back to its basic configuration helps to eliminate factors that may make a computer problem difficult to solve.

3 0
3 years ago
In a network, servers receive requests from which of the following?
Margarita [4]

Answer: routers, which direct the data to the correct destination.

Explanation:

In a network, servers receive requests from the routers, which direct the data to the correct destination.

The router simply refers to the networking device which helps in the forwarding of data packets between the computer networks. When a data packet is sent through one of the lines, then the information regarding the network address will be read by the router which will help it in determining the destination.

5 0
3 years ago
Read 2 more answers
ead the spreadsheet formula below, then answer the question. =SUM(C6:C9) What does the : symbol in the formula do? arranges the
melamori03 [73]
Selects all the cells in the range c6 to c9
3 0
3 years ago
Joe always misspells the word calendar. He types the word as calender but the correct spelling appears on the document. Which fe
Hunter-Best [27]

Answer:

autocorrect

Explanation:

i got it right

3 0
4 years ago
Read 2 more answers
Other questions:
  • By default, only the ________ options are allowed when the worksheet is protected.
    11·1 answer
  • After reading the article, "The Impact of Technology", answer the following question.
    14·1 answer
  • ____________ describes all the communication channels that allow community-based input, interaction, content-sharing and collabo
    13·1 answer
  • What are two examples of items in Outlook?
    12·1 answer
  • Cual es la definición de grouded ​
    7·2 answers
  • Which institution developed outside the limits of the written costitution of the united states ?
    14·1 answer
  • Lydia is trying to take an aerial shot from the window of an airplane. Where should she hold her camera to get the best shot?
    8·1 answer
  • Is orgenized maningful and useful data​
    15·1 answer
  • What peripheral displays us the image on a computer?​
    13·1 answer
  • Why is it important to enforce access controls and to keep logs regarding who has access to data closets
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!