1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yanka [14]
3 years ago
11

Unwanted emails are called:malware,phishing, spam or virus

Computers and Technology
1 answer:
Colt1911 [192]3 years ago
3 0
1. Spam
2. Phishing
3. True
You might be interested in
To save a document with a new name, click _______ in the navigation bar and enter a new filename.
cricket20 [7]
Click the save as button
3 0
3 years ago
Give five examples of top level domain​
coldgirl [10]

Answer:  .com — Commercial businesses.

.org — Organizations (generally charitable).

.net — Network organizations.

.gov — U.S. government agencies.

.mil — Military.

.edu — Educational facilities, like universities.

Explanation:

5 0
3 years ago
Read 2 more answers
Audra recently earned her associate’s degree and is looking for a job. Her resume lists her strengths in a separate section. Som
zhuklara [117]

With Audra’s associate degree and list of qualifications, she will be looking for an entry-level position. The position that would be most suitable for her would be (D) auditing clerk.

She will not quality for an Accountant and Marketing Manager position, which requires a longer amount of experience as well as a higher degree of education, and she is overqualified for the Data Entry position which does not require her level of qualifications.

8 0
3 years ago
Read 2 more answers
You are being hired as the director of IT for a small firm that does retail trade business, and you will be the source of knowle
Orlov [11]

Director of IT role is major decision maker or any IT related issue such as network security, database, network issues etc. As policy to one to one end user and it department, which should cover as follows.

1. End-user is not allowed to share files or media files to any user through email or social media.

2. Login password should not be changed without IT approval of pc or   workstation or laptop.  Once changes password should be shared to IT department.

3. Sharing password Wi-Fi or access point to outsiders to be avoided.

4. Connecting usb drive or flash drive to workstation or laptop,

5. Own laptop or smartphone should not be connected to office network.

6. If workstation or desktop or laptop is effected with virus immediately to be reported to IT department.

5 0
3 years ago
Which location on the ribbon contains the commands for adding a table to a document?
Maksim231197 [3]

Adding a table to a document can be done in Microsoft Word using the insert ribbon, the insert ribbon are mostly used for adding options to a document.

  • The insert ribbon is a multi functional ribbon which has up to about 10 different useful groups for adding elements to a document.

  • Some of the groups on the insert ribbon include ; Pages, Text, Header & Footer, Tables, illustrations, Links, Media and so on.

  • The Table group in the insert ribbon allows different table adding options such as inserting an already existing table, drawing a new table or importing an excel table.

Therefore, adding a table to a document is performed from the insert ribbon in Microsoft Word.

Learn more:brainly.com/question/21842366?referrer=searchResults

4 0
2 years ago
Other questions:
  • The ____ function displays the highest value in a range.
    15·2 answers
  • Assume you're running a query on your orders in the past year. You want to see how many orders were placed after May. What type
    5·1 answer
  • Compared to other forms of communication, texting does not offer as many message cues.
    13·1 answer
  • A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed
    8·1 answer
  • Suppose that a program asks a user to enter multiple integers, either positive or negative, to do some calculation. The data ent
    13·1 answer
  • CAN SOMEONE PLEASE HELP ME OUT I REALLY NEED THE ANSWER!
    14·1 answer
  • How do i use a computer (i'm 99999 years old)
    8·2 answers
  • Nina visited an area that receives a large amount of precipitation during all twelve months and is typically warm year round. Th
    11·1 answer
  • Can someone follow my tt its c1ndy.dont.miss
    6·1 answer
  • 1. Who was the first lady programmer?​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!