1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sertanlavr [38]
2 years ago
14

How can i protect my mobile devices from malware?

Computers and Technology
2 answers:
TEA [102]2 years ago
7 0
There are many methods u can do to protect it
Aneli [31]2 years ago
4 0
Turn it off and back on again
You might be interested in
What is the most appropriate data type for each of these items?
Tom [10]
I may be wrong, BUT here is what i think



b) line graph


d) pie graph
7 0
2 years ago
______is a multimodal application software platform. the centrealized and shared database system ties the entire organization to
m_a_m_a [10]

Answer:

ERP.  

Explanation:

Enterprise Resource Planning Is the software platform for bidirectional applications. The main objective of  ERP it shared the database system and connects the enterprise as a whole so that data can be reached the once and made accessible to all users.

The main advantage of Enterprise Resource Planning is that Enterprise cycle parallelization or optimization it also the boost performance of the organization and saving the time.

3 0
3 years ago
How can you insert an image file in your word document?​
Margarita [4]

Click the insert tab, it'll show a pop up window. Go to the location of where your picture may be. Double click on the photo, and it will be inserted into the word document.

6 0
2 years ago
All data process by a computer must be in 1. binary form 2. Hexadecimal form 3. Duodecimal form 4. Unitary form?
avanturin [10]

Binary code I believe.

3 0
3 years ago
Read 2 more answers
Write a program that will calculate the following function:
anyanavicka [17]
Shshshshshshsjsjsjsjjsjdhdhhddhhd
8 0
3 years ago
Other questions:
  • Add the following functions to the code:
    9·1 answer
  • The email application used by Jim’s office is sending emails with viruses attached to them to user’s computers. What step should
    13·2 answers
  • ShellShock had the potential for an unauthorized user to gain access to a server. It affected many internet-facing services, whi
    11·1 answer
  • Complete the following conversions. You MUST show all of your work to receive full credit.
    13·1 answer
  • Grooves and polished surfaces on desert pebbles are most likely caused by
    10·1 answer
  • What Are the Components of a Web Address? *​
    14·2 answers
  • • Comments are blank which can be blank entered into documents
    5·1 answer
  • IM a bit confused on what this is asking for exactly.
    14·1 answer
  • Another word for asking a question of your data is to _____ it.
    6·1 answer
  • From which os did windows xp evolve?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!