1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elis [28]
3 years ago
6

Can you help me here please​

Computers and Technology
1 answer:
stiks02 [169]3 years ago
6 0

Explanation:

because Anna is a music lover she had download lots of songs.When downloading songs a virus should have gone from the websites to her computer.

to avoid this problems she should not have gone through the different websites

You might be interested in
True False The explicit location always tells you where users are located when they type the query.
gregori [183]
It's true for only some users
7 0
3 years ago
Read 2 more answers
30 points
Murljashka [212]
The answers are Library Catalog access, Simultaneous access, 24/7 availability, and database resources. No physical boundary and systems are also viable options but brick and mortar access is definetely not one.
3 0
3 years ago
How do i open screenshots on school chromebook?
yuradex [85]

Answer:

you have to open your file explorer and open the screenshot folder.

Explanation:

3 0
2 years ago
Read 2 more answers
Which of the following best describes application software? coordinates hardware components provides system utilities like the c
Bezzdna [24]

Answer:

the answer is c

Explanation:

4 0
4 years ago
Read 2 more answers
The collection of programs on a computer is referred to as _______________.​
schepotkina [342]
It is referred to as software

Software consists of an entire set of programs and routines linked with the operation of a computer. In other words, it is a collection of executable instructions that enable you to interact with a computer and its hardware. A computer would be rendered useless without software.

 






5 0
4 years ago
Other questions:
  • A security system uses sensors at every door and window which will set off an alarm if any one of them is opened. There is also
    13·1 answer
  • What comes to mind when you see/hear QWERTY?
    14·2 answers
  • ____ allow us to store a binary image in code. (1 point)
    9·1 answer
  • Which data type structures best for insersion/ removal - Stack, linked list, queue?
    15·1 answer
  • 2 inventions revolutionized photography, what are they?
    10·1 answer
  • Which of the following is not one of the Generally Accepted Recordkeeping Principles ("The Principles®")? a. Accountability b. S
    11·1 answer
  • The GNU/Linux operating system comes with many built-in utilities for getting real work done. For example, imagine you had to an
    10·1 answer
  • Which category does this fall in identity theft​
    6·1 answer
  • Why is it important to think about the programming language to use?
    8·1 answer
  • Why are men more exposed to mass media?
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!