1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pogonyaev
3 years ago
13

Give two reasons why it is not advisable to open email from unknown sources​

Computers and Technology
2 answers:
sattari [20]3 years ago
6 0

Answer:

1. It might give your device a malicious virus or can grab your ip, so it isn't a good idea to open unknown websites. Always go to safe webs!

2. It might be a scam, let's say it is for a free iphone and you put your info in. It's a win-lose thing.

Explanation:

Oduvanchick [21]3 years ago
3 0

Answer:

viruses and indeninty fraud

You might be interested in
A function is executed when it is
Alekssandra [29.7K]

Answer:

D. called

Explanation:

A function is executed when it is called.

Function definition comprises of the code body of the function.For example:

int add(int a, int b){

    return a+b;

}

Function declaration or function prototype specifies the signature of the function ( number and type of arguments, return type). e.g,

int add(int a,int b);

Function call is when the function is executed with actual arguments:

add(2,4);

This will return 6 upon execution of function body.

6 0
3 years ago
Which is the correct sequence of steps for opening a new document?
ollegr [7]
Basic steps start with opening the program, clicking on File, then clicking on New for a new document.

Most programs open a new blank document when you open he program.
6 0
3 years ago
Read 2 more answers
An important safety precaution you should take before starting any electrical servicing job is to make sure that your
monitta
I'm pretty sure it's B. body is not grounded
5 0
3 years ago
Read 2 more answers
Which directory holds most of the system log files?
faust18 [17]
I think the answer to that is /var/log hope this helps
5 0
3 years ago
How do you answer questions
Vera_Pavlovna [14]

Answer:

like this

Explanation:

<h3>you click answer and then<u><em> boom</em></u></h3>
7 0
3 years ago
Other questions:
  • A ________ is a set of programs that manipulate the data within a database.
    12·1 answer
  • A company that hires only American Indians is practicing
    5·2 answers
  • when seeking information on the on the internet about a variety of subjects the most useful place to look would be?
    13·1 answer
  • Only business writing requires an editing stage
    8·1 answer
  • What was one of the first inventions that made it possible to communicate almost instantly?
    11·1 answer
  • Using either a UNIX or a Linux system, write a C program that forks a child process that ultimately becomes a zombie process. Th
    8·1 answer
  • Nikolas has a idea that he could use the compressed carbon dioxide in a fire extinguisher to propel him on his skateboard. Nikol
    13·2 answers
  • ____________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities
    7·2 answers
  • A ____ can be used to enter, display, or edit data
    5·1 answer
  • What does the following process describe?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!