1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liq [111]
3 years ago
10

What activities are the most likely to infect your computer vith a virus? Check all that apply.

Computers and Technology
1 answer:
Gnesinka [82]3 years ago
5 0

Answer:A,B,E

Explanation:

I just took the quiz

You might be interested in
Which button will allow you to insert quotes and notes into text into a document​
oksano4ka [1.4K]

Answer:

You copy and paste it

Explanation:

right click on the mouse then it will say copy, you right click on the mouse and click paste voila! it works! (If you're using word there are 3 options for pasting, Keep source formatting, Merge formatting and keep text only)

8 0
3 years ago
What is the first step a user should take toward generating an index?
Ad libitum [116K]

Answer:

I think that it's A

Explanation:

5 0
2 years ago
hãy lựa chọn một doanh nghiệp kinh doanh theo loại hình siêu thị việt nam em hãy tìm hiểu doanh nghiệp và thực hiện theo yêu cầu
Anastasy [175]

Quy trình kinh doanh, phương pháp kinh doanh hoặc chức năng kinh doanh là một tập hợp các hoạt động hoặc nhiệm vụ có liên quan, có cấu trúc bởi con người hoặc thiết bị, trong đó một trình tự cụ thể tạo ra một dịch vụ hoặc sản phẩm (phục vụ một mục tiêu kinh doanh cụ thể) cho một khách hàng cụ thể.

4 0
3 years ago
Select the correct answer.
swat32
Answer : C project planning
5 0
3 years ago
The _______ "represents a set of features that enables the user to inform himself whether a security feature is in operation or
quester [9]

Answer:

Visibility and configuration of security.

Explanation:

The visibility and configuration of security represents a set of features that enables the user to inform himself whether a security feature is in operation or not and whether the use and provision of services should depend on the security feature.

4 0
3 years ago
Other questions:
  • Carlos owns a hardware store. He currently is not using any software to track what he has in the store. In one to two sentences,
    9·2 answers
  • An excel user should use a relative cell reference when it is important to ____. preserve the relationship to the formula locati
    7·1 answer
  • Certain medications can increase risk of obtaining a sunburn true or false
    12·1 answer
  • Give a recursive implementation for the function: def is_sorted(lst, low, high) This function is given a list of numbers, lst, a
    10·1 answer
  • What is the device that uses sprockets along a film's perforated edges to run 50 feet of film in thirty seconds? A. cinematograp
    10·1 answer
  • Which of the following Web sites would be MOST credible?
    6·1 answer
  • The response from a Google Form can be seen in how many ways?
    10·1 answer
  • Please need help.... The system development process is called a cycle. Which of the following may be an ongoing process which su
    6·1 answer
  • How many total bits are required for a direct mapped cache with 16 KB of data and 4 word blocks Assuming a 32 bit address
    12·1 answer
  • This is a human-made physical system.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!