1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pogonyaev
3 years ago
13

Give two reasons why it is not advisable to open email from unknown sources​

Computers and Technology
2 answers:
sattari [20]3 years ago
6 0

Answer:

1. It might give your device a malicious virus or can grab your ip, so it isn't a good idea to open unknown websites. Always go to safe webs!

2. It might be a scam, let's say it is for a free iphone and you put your info in. It's a win-lose thing.

Explanation:

Oduvanchick [21]3 years ago
3 0

Answer:

viruses and indeninty fraud

You might be interested in
Someone hacked into an employee's computer and erased all of their data. All data for the past three weeks was lost as that was
hichkok12 [17]

WWW/ World Wide Web.

7 0
3 years ago
Is it legal to build cellphone tower
Marat540 [252]
If you build a cellphone tower without proper building permits and equipment without permission from local government than it would be illegal
3 0
4 years ago
⦁ ¿Cuáles son los recursos naturales que se utilizan en tu comunidad para generar energía eléctrica?
xxTIMURxx [149]
Turbinas de viento y turbinas de agua son utilizadas, entonces la respuesta podria ser viento y agua
7 0
3 years ago
Please answer fast! I need this now!
nexus9112 [7]

Answer:

The GDD (game design document) comprises of the three things. And the first thing is a description of the product, and which is explained in the question, and it is the gameplay. This part of the GDD mentioned in the question is the way the game is to be played, and what is the risk involved in the different stages of the game.

Explanation:

Please check the answer.

7 0
3 years ago
How do you change your password on this? This isn’t really a “Question” but....
MissTica
You go to edit profile and press the change password button.  click on profile pic
5 0
4 years ago
Read 2 more answers
Other questions:
  • Website reputation is an important part of page quality (PQ) rating. Reputation can justify the Highest rating and the Lowest ra
    15·1 answer
  • Write a static method named anglePairs that accepts three angles (integers), measured in degrees, as parameters and returns whet
    10·1 answer
  • In csma/ca, the amount of time a device is made to wait before it can transmit is called the ____.
    15·1 answer
  • _____ supplement operating system software in ways that increase the security or capabilities of the computer system. firewalls,
    15·1 answer
  • the part of the computer that contains the brain , or central processing unit , is also known the what ?
    12·1 answer
  • In Online Data Extraction data is extracteddirectly from the ------ system itself.o Hosto Destinationo Sourceo Terminal
    15·1 answer
  • What were thomas edison's contributions to advances in technology?
    9·1 answer
  • I need help with getting a profile pic
    5·1 answer
  • a hacker who plants a rogue wireless access point on a network in order to sniff the traffic on the wired network from outside t
    12·1 answer
  • In object-oriented analysis, an object is a member of a(n) _____, which is a collection of similar objects.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!