1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Verdich [7]
3 years ago
9

Should you let your computer scan email attachments before opening them? Why?

Computers and Technology
2 answers:
NISA [10]3 years ago
8 0
Jjsjskskiakskskakksjakakoa
rosijanka [135]3 years ago
8 0

no you shouldn't

Explanation:

you should just block them and report them

You might be interested in
A technician wants to limit access to a group of folders and is using Group Policy to prevent the users in the sales department
Mashcka [7]

Answer:

d. The technician should be setting NTFS permissions instead of using Group Policy.

Explanation:

NTFS (New Technology File System) permissions run on drives formatted with NTFS.Under NTFS permissions, individual users are granted permission at the Windows logon and so in this way local users and network users are affected, affecting each user from wherever he may be connecting from. In the example above using NTFS permissions would solve the problem of file system among departments .

4 0
3 years ago
________ uses shared computing resources instead of having local servers or devices to handle computing applications.
Oksanka [162]

Answer:

cloud computing

Explanation:

3 0
3 years ago
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
cestrela7 [59]

Answer: Stealth scanning technique

Explanation:

Stealth scanning technique consist of the following types of scans :

1. FIN scan

2. X- MAS tree scan

3. NULL scan

The FIN scan responds by considering port open if response in received for its packet sent with the fin flag else considered closed.

The X-MAS tree scan fires up by setting a  TCP packet with URG, PUSH, FIN flags and the port is considered open if no response.

NULL scans sends null packet and considers it to be an open port.

Stealth scanning techniques considers to get some response from the network with out actually using a handshaking and is used to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic.

3 0
4 years ago
Why has the Personal Software Process not been widely adopted by software industry?
professor190 [17]

Answer:

Personal software process is basically refers to the intellectually tough and demanding for a degree of commitment (for example: Prolonged and high priced training needed ) which are not usually feasible to attain.

In additional to the requiring stage of various dimension is culturally tough for various software program practitioners. As, it is not much feasible approach so the personal software processing is not much widely adopted by the various software industries.

5 0
3 years ago
In the water cycle,lake water will do which of the following first
Agata [3.3K]

What are the following?

5 0
3 years ago
Other questions:
  • What view and zoom setting do you need for true WYSIWYG display? Why?
    14·1 answer
  • Computers heat resistant materials breathing systems for fire fighters food-growing technologies improvements in all of the item
    14·1 answer
  • If you are working on a document and want to have Word automatically save the document every minute, what steps should you use t
    13·1 answer
  • Write a java program that declares an array "alpha" of 50 elements of type "double". Initialize the array so that the first 25 e
    11·1 answer
  • Convert the following C program to C++.
    9·1 answer
  • What is Hypertext Transfer Protocol?
    12·1 answer
  • How many types of sharing of Google Forms are possible?
    15·1 answer
  • What is the current record holder for the fastest car in the world? What is the top speed of it? 100 points to whoever gets it c
    12·2 answers
  • 12. Why is it so important to pay attention to your digital reputation?
    14·1 answer
  • What is most likely to happen to the purchasing power of money over time?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!