1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ad-work [718]
3 years ago
11

When performing actions between your computer and one that is infected with a virus, which of the following offers NO risk of yo

ur computer becoming infected
Computers and Technology
2 answers:
Serggg [28]3 years ago
7 0
I need the answers to help you with the question

DochEvi [55]3 years ago
3 0
What are the options?
You might be interested in
What are network operating systems
Svetllana [295]
A network operating system is basically a computer operating system that is designed to support a workstation, and other machines that are connected in the Local Area Network. It allows access to a certain devices and machines like printer, file sharing, etc.

4 0
3 years ago
What is the fullform of BIT​
Natalija [7]

▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬

The full Form of BIT is "Binary digit" which is the basic unit of information in computing . A Binary digit can be 0 or 1 . 0 represents off state & 1 represents on state .

▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬

8 0
2 years ago
Briefly describe the role of creativity and innovation to entrepreneurship​
prisoha [69]

Answer:

isia

Explanation:

Apooopooopeeepepe

8 0
3 years ago
You can perform numbers___on binary
Masja [62]

Answer:

c) arithmetic operations

3 0
3 years ago
Read 2 more answers
Which of the following is not a characteristic of a motorcycle?
MrRa [10]

Answer:

the correct answer is A

3 0
3 years ago
Other questions:
  • What shows on the web, what is behind the web (source code) and what is placed on the server (database) , is known as web source
    13·1 answer
  • A(n) __________ is a set of technologies used for exchanging data between applications and for connecting processes with other s
    14·2 answers
  • The first documented use of work release was in the ____.
    13·1 answer
  • Write a program that reads students’ names followed by their test scores. The program should output each student’s name followed
    13·1 answer
  • What are the cues that a website is safe to use for exchanging sensitive information?
    10·1 answer
  • What does "CPU" stand for?
    15·2 answers
  • What is the correct html for referring to an external style sheet?
    11·1 answer
  • Give ways on how to effectively save.​
    15·1 answer
  • To add a hyperlink to your presentation, select the text, choose Hyperlink from the Insert menu, and then
    15·1 answer
  • it is good to know and use the npsd framework while solution envisioning as part of the value discovery cycle. What is NPSD?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!