Answer:
Swipe down in the right corner or for older versions swipe from bottom
Explanation:
The type of agent software can she install on her systems to identify properly categorized or tagged information before it leaves the company is a strong antivirus software.
<h3>What are some ways to handle against email phishing attacks?</h3>
People are known to have system and they are said to have different kinds of attacks from outside sources. The ways to protect yourself from Phishing are:
- Be on guard towards the handing of sensitive information.
- Never click on alarming messages.
- Do not open any form of attachments that is suspicious or strange.
Learn more about phishing attacks from
brainly.com/question/2537406
Its B i think hope this helps !
The way a particular application views the data from the database that the application uses is a sub-schema.
<h3>What is Database?</h3>
A Database may be defined as a process of collecting data and information that is principally assembled for quick search and recoupment by a computer.
The sub-schema is the reasoning elucidation of that section of the database which is applicable and accessible to a specific application. This type of database is common to two or more applications.
Therefore, the sub-schema is the way through which a particular application views the data from the database that the application uses.
To learn more about Database, refer to the link:
brainly.com/question/26096799
#SPJ4