1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gennadij [26K]
3 years ago
10

IF ANYONE ANSWERS YOUR QUESTION WITH SOMETHING LIKE THIS:

Computers and Technology
2 answers:
vova2212 [387]3 years ago
4 0

Answer:Thank you very much! A user names SShalomeea has been hacking today. Anyone with that photo is a spammer.

Serga [27]3 years ago
4 0

Answer:

oh ok thank you for the heads up

Explanation:

You might be interested in
At the coffee shop where they work, Jen is the safety officer, Richard is in charge of administering first aid, Ashley is respon
Dafna1 [17]
They have etablished a good first aid system.
7 0
3 years ago
Read 2 more answers
Fair use allows individuals to break copyright so long as they ________.
Iteru [2.4K]
Can prove they are not infringing on copyright
4 0
3 years ago
What is the software that manages and controls the activities and resources of the computer? O The CPU The OS The ALU The GUI D
Elodia [21]

Answer:

the software that manages and controls the activities and resources of the computer is OS

Explanation:

the software that manages and controls the activities and resources of the computer is OS

because here we know that CPU is hardware

and ALU is a digital circuit that is use to perform arithmetic and logic operations

and

GUI or Graphical User Interface controls the graphical interface of the applications

so here correct option is OS that is the software that manages and controls the activities and resources of the computer

7 0
3 years ago
Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h
12345 [234]

Answer:

Identity Theft

Explanation:

Identity theft is the act of someone who obtains details about someone else illegally.  This is done to find personal and financial information such  name, address,social security number, passwords, and credit card number, phone number, e-mail, etc. Then the hacker can use this information to control bank accounts, e-mails, computers, portray himself as you are, or sell information to someone else.

3 0
3 years ago
Warning or pop-up that convinces a user that his or her computer or mobile device is infected with a virus or other problem that
o-na [289]
Idk... just dont trust those pop-ups unless your device is acting weird.
3 0
3 years ago
Other questions:
  • Chloe is building a kiosk-based Excel application. She wants to make some modifications to the screen elements in order to keep
    8·1 answer
  • Your computer running Windows 7 is doing some very strange things with the operating system. You are fairly certain it is not a
    10·1 answer
  • You are asked to install a device that will combine several connections to the Internet and provide the sum of the available net
    8·2 answers
  • What office application has animations on the home ribbon?
    7·2 answers
  • You can use RWA to demonstrate how to do something special on the web, such as displaying articles found on websites that suppor
    15·1 answer
  • Each processor core on a multi core processor generally runs faster than a single core processor
    14·2 answers
  • How is a technical certificate like a computer-related associate degree?
    12·2 answers
  • Describe the differences between program development and program execution, including the installed software required for develo
    5·1 answer
  • Computer design replaced ______________
    6·1 answer
  • Williams Bros. Appliances
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!