1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eimsori [14]
3 years ago
14

A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c

oworker recalls there is a setting in the Internet Options dialog box to prompt the user before downloading ActiveX controls, but can't remember which tab to use.
Computers and Technology
1 answer:
levacccp [35]3 years ago
5 0

Answer:

The security tab should be used.

Explanation:

With ActiveX, your internet browser (in this case Internet Explorer) is given permissions to communicate with your computer beyond the borders of HTML.

For example, ActiveX makes it possible for a user to run computer diagnostics directly from their browser.

Therefore, users are opened to ActiveX attacks, especially when they do not get prompted before ActiveX controls are downloaded.

To be prompted before downloading ActiveX controls, go through the following steps:

  1. Open the Internet Explorer application,
  2. Select the Tools menu,
  3. Click Internet Options,
  4. Locate the Security tab,
  5. Click on custom level
  6. Locate the ActiveX controls and plug-ins section.
  7. Enable the Automatic prompting for ActiveX controls option.
  8. Click OK and restart Internet Explorer.

You might be interested in
The GaVS resource where students can locate information regarding Canvas, student email, registration and O365 is called the: St
wariber [46]

I Inferred you are referring to the Georgia Virtual School resource program.

<u>Answer:</u>

<u>Guidance Center</u>

<u>Explanation:</u>

Interestingly, the Georgia Virtual School (GaVS) enables students access to Virtual education.

Their resource platform allows students to find information regarding Canvas, student email, registration and Office 365 etc by simply going Guidance Center.

7 0
3 years ago
Which model states that the people and the environment for communication are constantly changing? A. linear B. interactive C. tr
In-s [12.5K]

The interactive model of communication states that the people and the environment for communication are constantly changing.

B. interactive

<u>Explanation:</u>

The world is a big place and you must have come across the infamous hearing, "Change is the only constant". Gradually, with the passage of time, the mindset of the people change over a certain topic for communication.

For instance, in old times, people did not prefer their children to have love marriages, in fact India has also seen honor killings to prevent love marriages. But now most portion of the society stands in favor of love marriages. People change, perspective change, and so does the perception and ideas.

6 0
3 years ago
To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwi
serg [7]

Answer:

True

Explanation:

BSA (The Software Alliance), styled as "BSA | The Software Alliance," is a trade group founded by Microsoft in 1988 that attempts to eliminate software piracy of the software made by its members. Many major software makers are part of the BSA, including Adobe, Apple, Autodesk and Oracle, among others.

6 0
2 years ago
You need a version of usb technology that will support older usb devices, of which you have many, as well as newer ones. what wo
andrezito [222]
I would want to see the word compatible in the specs
8 0
3 years ago
What types of storage can be used to access your data on a another computer
vladimir1956 [14]
1. Cloud Storage, such as dropbox or Google drive,
2. Network attached storage, where all your data is stored on a central NAS, and you can access it in Windows explorer or Mac Finder
3 Data on flash drive or on an external hard drive.
3 0
3 years ago
Other questions:
  • In a two-sided tag, a(n) ____ tag indicates the content's end.
    7·2 answers
  • On a wireless router, what gives out IP addresses?<br> DHCP<br> DNS<br> WPA<br> WPS
    10·1 answer
  • If you were setting up a network with 100 nodes and you wanted no more than 25 nodes per segment: what devices and connections w
    9·1 answer
  • Which model emphasizes the risk analysis phase of development
    12·1 answer
  • Develop a Python program. Define a class in Python and use it to create an object and display its components. Define a Student c
    11·1 answer
  • A customer has a computer for a home business, but wants to have another computer as a web server. What would be the best soluti
    11·2 answers
  • Dash transfers several bits of data together at one time<br>​
    6·1 answer
  • Select the correct answer.
    8·1 answer
  • Using a wireless technology known as ___, many smartphones can now be tapped on special payment devices to complete your purchas
    13·1 answer
  • Which three decisions might a specialized drone delivering medical supplies make once it's algorithm has started and it is scann
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!