1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
serg [7]
3 years ago
12

When performing actions between your computer and one that is infected with a virus, which of the following offers No risk of yo

ur computer becoming infected?
A. Printing to the same printer as infected computer
B. Accepting email attachments sent from an infected computer
C. Sharing Word documents with an infected computer
D. Sharing removable disks with an infected computer
Computers and Technology
1 answer:
daser333 [38]3 years ago
7 0

Answer:

d

Explanation:

You might be interested in
Which of the following is the best name for a history report about world war 1
kolezko [41]

Answer: "World War-1: The War that Changed the Nation"

8 0
3 years ago
Technology changes rapidly. Do you think the development of new technology will slow down at some point? At some point will cons
KiRa [710]

Answer:

1st question=no

2nd question=consumer will never be satisfied.Unless the technology is super strong that nothing can stop it

3rd question=almost everything,first they build technology because they want humans life to be easy.

wish it helps

7 0
3 years ago
When citing an Internet source:__________. a. it is ok to omit quotation marks if you change some words in the original sentence
ludmilkaskok [199]

Answer:

c. it is ok to omit quotation marks for a paraphrase of the source.

Explanation:

Plagiarism can be defined as the act of representing or using an author's work, ideas, thoughts, language, or expressions without their consent, acknowledgement or authorization.

In order to avoid plagiarism, it is very important and necessary to reference or cite the source of the informations and data.

However, when citing an Internet source, it is ok to omit quotation marks for a paraphrase of the source because the idea, thoughts or intellectual work as being rephrased.

3 0
3 years ago
On tool hackers use to get sensitive information from victims is/are:
Feliz [49]
Pretty sure it’s keyloggers because it’s the only one that makes sense to me but I’m not 100% sure on that one
5 0
3 years ago
Read 2 more answers
Which type of workplace culture emphasizes the development of new skills?
Archy [21]
Involvement is the answer just took it. thank you

6 0
3 years ago
Read 2 more answers
Other questions:
  • Look at the following form. Which input method is the form using to receive the user's favorite activity? What is your favorite
    12·2 answers
  • What is industry 4.0 -automation revolution-, what is your opinion about the direction this revolution is taking the industry in
    8·1 answer
  • The _________ check is a type of hardware control that involves adding a "1" or a "0" to the end of every 8 bit byte such that t
    11·1 answer
  • Another html/css assignment, drop css code below, thank you
    15·1 answer
  • The _ are the devices that allow a computer system to communicate and interact with the outside world as well as store informati
    11·1 answer
  • 1. What are the built-in operations on classes?
    8·1 answer
  • Which window allows you to view and change your computer's system information and settings?
    9·2 answers
  • All 24-point fonts take up the same amount of space on a slide. True False
    7·2 answers
  • At year end, Clean123 Inc. has 45500 in cash, 55000 in accounts receivable, 54400 in service equipment, 550 in prepaid insurance
    12·1 answer
  • Most effective way of closing email is<br>​
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!