1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elenna [48]
4 years ago
9

When are computers most vulnerable to threats or damage?

Computers and Technology
1 answer:
valentinak56 [21]4 years ago
8 0
With virus protection
You might be interested in
Which of the following is NOT an example of a font style?
erastovalidia [21]
C. Underline because it is not a kind of font. it is an effect.
3 0
3 years ago
How long does a baby dolphin stay with its mum
g100num [7]
The nursing usually takes up to 18 months, i.e. one year and a half.

The baby dolphin may however remain with his mum for up to 3-6 years.
5 0
3 years ago
How do you properly turn off a computer?
Ugo [173]

Answer:

with the power button or do the sleep or shut down

and by the type of computer

Explanation:

sry if its wrong

have a good day:)

-XxMissNobodyxX

7 0
2 years ago
Read 2 more answers
A program that is used to view websites is called a​
Nookie1986 [14]

Answer:

A web browser

examples of this would be

Bing

6 0
3 years ago
Read 2 more answers
Define application software​
sp2606 [1]

Answer: An application software is a type of software that the user interacts with, while a system software is a type of software that the system interacts with.

Hope this helped you :)

7 0
3 years ago
Other questions:
  • How is an interpreter different from a compiler?
    6·2 answers
  • Most colleges require blank years of foriegn language for admission
    9·1 answer
  • Which PowerShell command will upgrade the VM configuration version to take advantage of the new features in Windows Server 2016?
    12·1 answer
  • What component of a processor handles all logical comparisons and calculations inside the processor?
    9·1 answer
  • An extract report lists ____________.
    14·1 answer
  • Suppose that we are using PDDL to describe facts and actions in a certain world called JUNGLE. In the JUNGLE world there are 4 p
    7·1 answer
  • Which scenario is best for an online discussion group?
    5·1 answer
  • 23+ Composition refers to
    11·1 answer
  • In the forward chaining technique, used by the inference engine component of an expert system, the _____ condition is evaluated
    5·1 answer
  • 1. What are the process involved in data processing cycle?​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!