1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lukranit [14]
4 years ago
11

If you receive an email message you suspect is spam, what should you do?

Computers and Technology
1 answer:
Alla [95]4 years ago
6 0

Answer:

A.  delete the message without opening it.

Explanation:

Never open emails you don't know who sent it, it could be a hacker trying to get your personal/financial information.

You might be interested in
Complete the rest of this statement:
Radda [10]

Answer:

Computer science is about how computers work, in terms of programming, design and data processing.

Explanation:

Computer science is a discipline that studies issues related to information technology and its use, including the storage, processing, presentation, and transfer of information.

The fringes of computer science extend to many other sciences: for example, usability research is closely related to psychology and bioinformatics to biology, among others. Digital media research, on the other hand, has links to media science and communications research. Computer science also has a strong interaction with computational science and information society research examining the wider effects of data processing in different areas.

4 0
3 years ago
A _____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific
Vera_Pavlovna [14]

Answer:

User application

Explanation:

A user application is a program that is created by using a standard software that is adjusted to the user's needs that can't be fulfilled by an existing system. According to this, the answer is that a user application utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user productivity.

7 0
3 years ago
Emma is creating a database to track sales. She wants to be able to sort by price and sales associate. And she would like to loo
alexira [117]

Barcode number, description, price, and sales associate.

5 0
3 years ago
Read 2 more answers
The secure evidence locker is located at the ____.
olga55 [171]
The data recovery lab

Data recovery can be done in special rooms called data recovery labs. Data that has been salvaged, lost, or inaccessible from removable media or secondary storage can be accessed in a normal way. Recovery of this kind may be required due to the physical damage caused.

 

 

 





5 0
3 years ago
Which of the following statements describes a limitation of using a computer simulation to model a real-world object or system?
never [62]

Answer:

The answer is "Option c".

Explanation:

Computer simulation, use of a machine to simulate a system's vibration signals by another modeled system's behaviors. A simulator employs a computer program to generate a mathematical model or representation of a true system. It usually gives a lot of simplifications concerning the physical image or system that is modeled, so this statement describes the limitation of using a computer simulation in modeling a real-world object or process.

5 0
3 years ago
Other questions:
  • Write a program that takes nouns and forms their plurals on the basis of these rules:
    8·1 answer
  • After making a PowerPoint presentation about a new line of clothing designs, Henri notices that he used the word “gorgeous” on n
    7·1 answer
  • Write a statement that declares an int variable named count.
    9·1 answer
  • Which of the following is optional equipment on a basic life support​ ambulance? A. Lubricating jelly B. Flashlights C. Disinfec
    11·1 answer
  • DOUBLE POINTS!! PLEASE HELP QUICKLY!!!!!
    15·2 answers
  • Every presentation should have a beginning, a middle, and an end.
    10·1 answer
  • Use the conversion table below to help you answer the question.
    8·1 answer
  • Describe the inter-relation and linkage in between traditional knowledge, indigenous knowledge and modern technology.​
    7·1 answer
  • Define Technology. Explain the term.​
    13·2 answers
  • Write a program that will make a copy of a text file, line by line. Read the name of the existing file and name of the new file(
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!