1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
dimulka [17.4K]
3 years ago
12

Randall is unhappy because the server at his college blocks some emails with attachments, so he is unable to receive a particula

r file from his friend.
Which is the best explanation for why certain email attachments are blocked?

A. They are blocked because people can share inappropriate files through email.
B. They are blocked because attachments use too much bandwidth.
C. They are blocked because certain attachments contain harmful viruses.
D. They are blocked because email is not the best way to share files.
Computers and Technology
2 answers:
tatiyna3 years ago
8 0
If the school has age restrictions it can read 18+ content but it depends on the school. Viruses as by my past experiences with friends can transfer from anywhere to another place because it disables security connections.

The answer is A.
I am Lyosha [343]3 years ago
8 0
 <span>They are blocked because certain attachments contain harmful viruses is </span>best explanation for why certain email attachments are blocked.
You might be interested in
"If someone really wants to get at the information, it is not difficult if they can gain physical access to the computer or hard
Jobisdone [24]

Answer:

It is  just true in most cases

Explanation:

This statement is just true in most cases because in some cases having a physical access to the computer or hard drive this does not guarantee access to the information contained in the hard drive or computer because the data/information in the hard drive or computer might as well be encrypted and would require a password in order to de-crypt the information.

Having a physical access is one step closer in some cases but not the only step required .

4 0
3 years ago
WHAT ARE THE RISK OF DUST​
Step2247 [10]

Answer:

over heating

Explanation:

in computers dust acts as a blanket which traps heat, excessive heat causes components to burn up and short out

3 0
3 years ago
Read the following scenario, and then answer the question.
maxonik [38]

Answer:

Monitor size

Explanation:

Hope this helps

4 0
3 years ago
Read 2 more answers
List all the connectors or components that can be connected internally to the motherboard
Amiraneli [1.4K]

A computer’s motherboard has a series of slots and connectors. Slots allow daughter boards to be plugged directly while connectors allow communication through cables with other peripheral devices. CPU sockets, Hard Drive connectors, Memory sockets, and Power connector are examples of components that can be connected internally in some way to the motherboard. Other physical devices include RAM, hard disks, and graphics card.

5 0
3 years ago
Read 2 more answers
Regression testing should be a normal part of integration testing because as a new module is added to the system new
nikklg [1K]
It's E) both A and B A) Control logic is invoked B) Data flow paths are established
7 0
3 years ago
Other questions:
  • ASAP HELP NO GUESS A new pet store wants to design a logo to be displayed on business cards, posters in the shop’s windows, and
    9·2 answers
  • Which was cited as a reason why Google became so popular?
    12·1 answer
  • Because public key encryption requires the use of two different keys, it is also known as _____ encryption
    13·1 answer
  • - What are the different types of clients?
    12·1 answer
  • Which describes the first step a crawler-based search engine uses to find information?
    14·2 answers
  • Write a Java program that launches 1000 threads. Each thread adds 1 to a variable sum that initially is 0. You need to pass sum
    11·1 answer
  • What read a page on website​
    15·1 answer
  • Để các hình chiếu cùng nằm trên mặt phẳng to phải làm gì
    8·1 answer
  • Explain the differences between copyright, fair use, and trademark?
    13·1 answer
  • Kim is writing a sql query that will pull a list of customers with outstanding orders and the sales rep for each order. What sho
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!