1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verdich [7]
3 years ago
9

Should you let your computer scan email attachments before opening them? Why?

Computers and Technology
2 answers:
NISA [10]3 years ago
8 0
Jjsjskskiakskskakksjakakoa
rosijanka [135]3 years ago
8 0

no you shouldn't

Explanation:

you should just block them and report them

You might be interested in
You work as the IT security administrator for a small corporate network. You have designed the physical security of the offices
ladessa [460]

The security IT administrator he or she is planning to install smart card communications over the network which is can be access through TCP IP address.

Smart card key reader to be placed or installed where is required  such as an opening door  or entrance of office or organization extra.

Key card readers should be contactless and record more volume of data and it should synchized with the system at regular intervals.

By Installing smart card and it readers unauthorized  person entry to lab or network server can be avoided. Since smart card reader connected to the network, IT SECURITY administrator can generate log reports.

5 0
3 years ago
Two electronics students are discussing static electricity and electric current. Student A says that a basic property of static
Svet_ta [14]
The answer is D. Only student B is correct. Student A is incorrect because static electricity can be detected through the principle of electrostatic induction, which will indicate if there are static electricity on the surface of an object. A device which can detect static electricity is an electroscope. Moreover, for student B, it is correct that the cause for electric current to flow is the uniform flow of free electrons.
3 0
3 years ago
A household consists of a married couple and their twin five-year old daughters. The couples children had no income and lived wi
Colt1911 [192]

Answer:

APEX- 4.

Explanation:

4 0
3 years ago
Read 2 more answers
Who is considered as the father of computer science​
Andru [333]

Answer:

Turing is considered as the father of computer science

4 0
3 years ago
Read 2 more answers
For each of the following scenarios, write down what feature should be used in
inessss [21]

Answer:

d

Explanation:

5 0
3 years ago
Other questions:
  • Considers the assets of all things in an environment, and refers to the layering of security tools and methods often varying num
    13·1 answer
  • Compilers can have a profound impact on the performance of an application. Assume that for a program, compiler A results in a dy
    8·1 answer
  • Bit rate is a measure of how many bits of data are transmitted per second. Compared to videos with a higher bit rate, the same v
    13·1 answer
  • Professional photography is a competitive job field. <br> true <br> false
    12·2 answers
  • Plz help me of this answer<br><br><br>language:python​
    7·2 answers
  • Which sentence best describes the executive branches of state
    12·1 answer
  • Why Prithvi Narayan Shah are appointed the person favoured by the people at Kazi
    8·1 answer
  • Which search phrase is the most effective to find out about the most popular pizza chains worldwide in 2019?
    9·2 answers
  • Identify a possible IOT (internet of Things) device in a smart kitchen and write a use case for interacting with the software of
    12·1 answer
  • When a number gets assigned to a variable that already has a value __________. the new number overwrites the previous value at t
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!