1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yanka [14]
3 years ago
11

Unwanted emails are called:malware,phishing, spam or virus

Computers and Technology
1 answer:
Colt1911 [192]3 years ago
3 0
1. Spam
2. Phishing
3. True
You might be interested in
3.4 code practice question 2 edhesive
Gelneren [198K]
???????????????????
7 0
3 years ago
Read 2 more answers
____________ is the ability to stand up for your own interests and to ask for what you want. A. Discipline B. Arrogance C. Asser
devlian [24]
C. Assertiveness. Assertiveness is defined as confident and forceful behavior, so it is the only one that makes sense.
8 0
3 years ago
Read 2 more answers
When do I use while loops
Marat540 [252]

Answer:

When you dont know how long the loop is going to run for

Explanation:

7 0
3 years ago
Data as a service began with the notion that data quality could happen in a centralized place, cleansing and enriching data and
saul85 [17]

Answer: True

Explanation:

 Yes, the given statement is true that the data as the service model basically describe about the data quality which could be happened in the centralized place and also enriching the given data. It also offer the data services to the different types of users, system and applications.

 The data as a service (DaaS) is similar to the software as s service. The DaaS concept is that it is provided according to the requirement of the user such as data and information of the different types of product and services.

 It is technically known as the web delivering service which is offer by the cloud manager and its also perform various types of function.  

7 0
3 years ago
Describe the key differences between raster-based and vector-based graphics.
Kazeer [188]

Answer:

asd

Explanation:

8 0
3 years ago
Other questions:
  • A ______________ deals with the potential for weaknesses within the existing infrastructure to be exploited.
    10·2 answers
  • Why is it important to open the Map Custom Fields dialog box before importing/exporting a list of contacts? Check all that apply
    6·2 answers
  • consider a group of 30 people who wish to establish pair-wise secure communications using symmetric-key cryptography. How many K
    15·1 answer
  • Choose the best answer to complete the sentence.
    14·1 answer
  • Software que busca, detecta y elimina malware tipo espía; puede instalarse en la computadora de manera aislada o en conjunto con
    11·1 answer
  • Create the HTML code for this
    14·1 answer
  • What would be the consequences if the Memory Manager and the
    15·1 answer
  • Use USB in a sentence
    15·2 answers
  • Importance of software in computer​
    14·1 answer
  • The short-range two-way communication technology behind contactless payments is called ____.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!