1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Greeley [361]
3 years ago
15

Any action that causes harm to your computer is called a

Computers and Technology
1 answer:
oksano4ka [1.4K]3 years ago
3 0

Answer:

Security risk.

Explanation:

It is making your computer vulnerable to attacks and less secure.

You might be interested in
What information is displayed in the message header of a received message? Check all that apply.
Aleks04 [339]

Answer:

the subject of the message

the sender's name

the recipient's name

the date and time when the message was received

Explanation:

Various information is displayed in the header of the message of a received message. And they are the subject of the message, which briefs what is there inside the message. And it mentions the sender's name as well as the recipient's name, and finally, the date and the time as well are stated that explains exactly when the message was being received. And all this information is shown in the header of the message.

3 0
4 years ago
OO<br>(A) 3 and 5<br>(B) 4 and 8<br>(C) 2 and 0<br>(D) 6 and 9<br>2. There are twelve books on a shelf and four children in a ro
dlinn [17]

Explanation:

2.there will be 8 books left on the shelf if each child takes one

8 0
3 years ago
B. START: What new information, strategies, or techniques have you learned that will increase your technology skills? Explain wh
Komok [63]

It is important to star typeing rather than know how to have all the little secrets.

7 0
3 years ago
true or false? spreadsheets provide more options for graphical representation of the data than databases​
myrzilka [38]

Answer: True. Its true and it will be true.

8 0
3 years ago
The only way to get a web site for your company is to pay a professional designer
dimulka [17.4K]

Answer:

??False?

Explanation:

4 0
3 years ago
Other questions:
  • Which option describes wearable technology? A. the incorporation of technology into objects we use regularly B. rugged technolog
    8·1 answer
  • Specification of database requirements falls under which category of database​ administration?
    8·1 answer
  • What is the purpose of a mail merge field?
    9·2 answers
  • How to take a key off a keyboard without breaking it?
    14·1 answer
  • What is the main characteristic of a Peer-to-Peer (P2P) network?
    8·1 answer
  • Diligent people are as concerned with the ____ as the ___ of their work
    12·1 answer
  • A(n)_________________printer is produce high-quality and is inexpensive *​
    14·1 answer
  • How are keyboards applied in the real world
    13·1 answer
  • Your computer is taking longer than usual to open files and you notice that your hard drive light stays on longer than usual whi
    9·1 answer
  • What is obamams last name
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!