1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lawyer [7]
3 years ago
8

Why should we be careful about opening email attachments?

Computers and Technology
2 answers:
quester [9]3 years ago
8 0

Answer:

files can easily infect your computer with viruses or malware.

Explanation:

Lubov Fominskaja [6]3 years ago
7 0
They can have hidden malware and viruses embedded in them that can cause serious harm to your computer.
You might be interested in
What is one benefit of using electronic flash cards?
velikii [3]

Answer:

They can be searched using keywords. they may have a different alarm settings. they provide a personal organizer.

Explanation:

Hope this helped Mark BRAINLIEST!!!

4 0
3 years ago
Read 2 more answers
How is distributed ledger technology (DLT) used in a blockchain?
andrey2020 [161]

Answer:

I believe the answer is D. To keep records of transactions in different places.

Explanation:

3 0
2 years ago
A(n)<br> is a fast compute with lots of storage. pls help
Pachacha [2.7K]

Answer:

Surface Laptop 3 - 15", Platinum (metal), AMD Ryzen 5 3580U, 8GB, 128GB

4 0
3 years ago
Read 2 more answers
What is the purpose of an index page feature in a Word document? Check all that apply.
Delvig [45]

Answer:

A. Helps to quickly find information in a document

B. Points readers to specific page numbers

D. Locates specific sections within a document

4 0
3 years ago
Read 2 more answers
Guess the output of this code:print( (3**2)//2 )
V125BC [204]

Answer:

Assuming that's in python, the answer would be 4

Explanation:

The ** operator is for raising a number to a power.

The // operator returns the number of times the right number can fit into the left (i.e round division).

So the answer would be three squared over two rounded down, or 4.

6 0
3 years ago
Other questions:
  • What is the difference between operating systems and application software?
    6·2 answers
  • ________ is a password-cracking method wherein the attacker compares passwords to lists of common words.
    12·1 answer
  • Liz's meeting is scheduled to end at 9:30. It is 9:20 and team
    9·1 answer
  • Uses of computer in daily life
    9·2 answers
  • Explain how being a metal, metalloid, or non-metal affects conductivity
    10·1 answer
  • Explain the need for data structures when developing software.
    12·1 answer
  • In a singing competition, there are 34 more men than women
    5·2 answers
  • Why is there no I do you time of day when all students should study
    10·1 answer
  • What task do the referential integrity settings prevent?
    12·2 answers
  • Why might you use the More button in the Find and Replace dialog box?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!