1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ohaa [14]
3 years ago
11

When performing actions between your computer and one that is infected with a virus, which of the following offers NO risk of yo

ur computer becoming infected
Computers and Technology
1 answer:
Alexandra [31]3 years ago
6 0

The one already infected, I think ..

You might be interested in
Janelle went to update the last name for one of her group contacts. She double-clicked on the contact, changed the last name, an
Ivanshal [37]
Janelle should have clicked Save & Close to close the contact.
5 0
3 years ago
Read 2 more answers
A 16M X 16 main memory is built using 512K X 8 RAM chips and memory is word addressable.
Yanka [14]

Answer

The answer and procedures of the exercise are attached in the following archives.

Step-by-step explanation:

You will find the procedures, formulas or necessary explanations in the archive attached below. If you have any question ask and I will aclare your doubts kindly.  

7 0
3 years ago
How can information technology transform the way business processes in an organization
timurjin [86]

Answer:

1. Through cooperation.

2. Understanding the market and the organization.

Explanation:

Information Technology can transform the way business processes in an organization only if there is cooperation in the company. The cooperation is that everyone is to agree on the change that it is going to cause.

An information Technologist can change the way business process if he or her understand the maker of the company and the company.

The major point is this:

1. The company must cooperate.

2. Everybody must accept change for it to grow higher.

3. Understand the market of the company and

4. understand the company and how they operate and then change and replace the parts that need replacement.

6 0
3 years ago
DO, of X isvvvvvvvvvvvvvvv
dem82 [27]
Huh ? I don’t understand the question
8 0
3 years ago
The second version of css, css2, was introduced in 1998, expanding the language to provide styles to _________.
Evgen [1.6K]

Answer:

Structured Documents

Explanation:

Structured Documents consist of hierarchy in the files. They may include data files. HTML (Hyper-text markup language) documents and XML (Extensible Markup Language) applications are the examples of Structured Documents.

6 0
3 years ago
Other questions:
  • In a program called Nature's Notebook, citizen volunteers make and report observations about seasonal changes in plants and anim
    15·1 answer
  • What is the maximum number of fonts that should be used on a slide?
    13·1 answer
  • What are ways to enter a formula in Excel? Check all that apply. Click on the Function Library group and select a function from
    10·2 answers
  • How can you ensure you don't go over your budget?
    8·1 answer
  • HELP URGENT
    12·2 answers
  • Identify the use of queue in the process of spooling output to a printer.
    15·1 answer
  • Which of the following is a programming language that permits Web site designers to run applications on the user's computer?
    15·1 answer
  • What do mobile platforms utilize to stream voice, IP telephony, mobile internet access, video calling, gaming services, cloud co
    15·1 answer
  • What is the difference between computer hardware and computer software?<br>​
    10·1 answer
  • Select the correct answer.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!