1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ahrayia [7]
3 years ago
12

Computer viruses often spread by means of what?

Computers and Technology
2 answers:
lozanna [386]3 years ago
8 0
Email attachments hope this helps
Alex17521 [72]3 years ago
5 0

Answer:

Email attachments just took the test

Explanation:

Its easy to travel off those because they are free of security and protection ur welcome.

You might be interested in
What are the benefits of team collaboration?
guapka [62]

Pretty simple. Ever heard of the saying 'More minds are better than one'? Well, it's true. Not only would you come up with better answers with a shared opinion, your opinions and ideas are less biased from past experiences, so they are more accurate every time!. Plus, in terms of a team collab, tasks can be completed faster if everybody focuses on different things instead of one.

:)

4 0
3 years ago
Read 2 more answers
Which of the following statements are true?
grin007 [14]

Answer:

I think the answer are two which are B and C

7 0
4 years ago
In C++, objects instantiated on the stack must be returned to program memory through the explicit use of the delete keyword.
Lady_Fox [76]

Answer:

b. False.

Explanation:

Delete function not used to remove data stored on the stack. It is only used to free memory on the heap. The C++ is programming language used to develop operating systems.

8 0
3 years ago
When creating a mail merge, you must insert all of the items from your data source into your merged document. Truth or false ?
ElenaW [278]
True <----------------
3 0
3 years ago
Read 2 more answers
How is the number 13,000 abbreviated in scientific notation?
Gennadij [26K]
<span> 13,000 is the same as 1.3 x 10^4</span>
3 0
3 years ago
Read 2 more answers
Other questions:
  • Select the correct answer.
    15·1 answer
  • The length of a pencil would most likely be measured in:
    9·2 answers
  • The difference between a want and a need is a want is not necessary for survival. Things necessary for survival are known as ___
    6·1 answer
  • You modify a document that is saved on your computer. Where are the changes stored until you save the document?a. Radom access m
    15·1 answer
  • Write an expression that executes the loop while the user enters a number greater than or equal to 0.
    10·1 answer
  • Raid level 6 is basically the same as RAID level 5, but it adds a second set of parity bits for added fault tolerance and allows
    7·1 answer
  • You are a network engineer tasked with performing a site survey for a multiple-channel architecture (MCA) system in a three-stor
    11·1 answer
  • Describe the functions of a system software​
    6·2 answers
  • Aii so is anyone pushing P?<br> if u are u a g
    8·2 answers
  • If you're connected to a switch and your NIC is in promiscuous mode, what traffic would you be able to capture
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!