1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lawyer [7]
3 years ago
8

Why should we be careful about opening email attachments?

Computers and Technology
2 answers:
quester [9]3 years ago
8 0

Answer:

files can easily infect your computer with viruses or malware.

Explanation:

Lubov Fominskaja [6]3 years ago
7 0
They can have hidden malware and viruses embedded in them that can cause serious harm to your computer.
You might be interested in
Im stuck in this and its a easy
Tamiku [17]

Answer:

just turn off your computer.

Explanation:

4 0
3 years ago
Read 2 more answers
How do the existence of the intranet and extranet help businesses (List 5 benefits of intranet and 5 of the extranet).
Dafna11 [192]

Answer:

An intranet is a private - internal - business network that enables your employees to share information, collaborate, and improve their communications. An extranet enables your business to communicate and collaborate more effectively with selected business partners, suppliers and customers.

6 0
3 years ago
Suppose that a 2M x 16 main memory is built using 256kB x 8 RAM chips and memory is word addressable, how many RAM chips are nec
hoa [83]

Answer:

16 RAM chips

Explanation:

To calculate the number of RAM chips needed, we divide the total size of the main memory by the size of each RAM chip. Hence:

Number of RAM chips required = Main memory size / size of one RAM

2M = 2²¹, 16 = 2⁴, 256K = 2¹⁸, 8 = 2³

Hence:

Number of RAM chips required = (2²¹ * 2⁴) / (2¹⁸ * 2³) = 2⁴ = 16

Therefore 16 RAM chips are necessary

5 0
3 years ago
Software designed to penetrate security controls, identify valuable content, and then encrypt files and data in place in order t
rjkz [21]

Software designed to penetrate security controls, and to unlock the encryption is known as Ransomware .

<h3>What is Ransomware?</h3>

Ransomware is known to be a kind of malware set up or made to encrypt files on a device, and makes any files and the systems that rely on them to be unusable.

Note that Software designed to penetrate security controls, identify valuable content, and then encrypt files and data in place in order to extort payment for the key needed to unlock the encryption is known as Ransomware.

Learn  more about encryption from

brainly.com/question/9979590

#SPJ1

3 0
2 years ago
What can you use on the Internet to look for information?
4vir4ik [10]

Answer:

I use Wikipedia to know anything

6 0
3 years ago
Other questions:
  • Which of the following set of instructions defines an algorithm in the formal, strict sense?
    14·1 answer
  • 30 points!!! Which type of a network is the Internet?
    8·2 answers
  • When using IPsec, how can you ensure that each computer uses its own private key pair?
    12·1 answer
  • Assume that the following variables have been defined in a program: int x = 10; int y = 20; int z = 30; Write a cout statement t
    11·1 answer
  • Your mother wants to purchase a large hard drive for her computer and asks you to see what type of drive interface she has. Her
    13·1 answer
  • What are the answers to 14 and 15
    10·1 answer
  • Which table option enables you to combine the contents of several cells into one cell?
    6·2 answers
  • The right to make others do things is referred to as _________.
    14·2 answers
  • Which is an example of an input device?
    6·2 answers
  • Betty was sitting at a coffee shop reading her favorite book. She heard an explosion nearby. In a few, she could hear ambulance
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!