1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
levacccp [35]
3 years ago
7

Which routine best ensures email safety?

Computers and Technology
2 answers:
Musya8 [376]3 years ago
7 0
Scan everything for viruses 
USPshnik [31]3 years ago
4 0
<span>Don’t open emails or download attachments from unknown senders</span>
You might be interested in
Does anyone know how to permanently delete photos on a dell computer? For my cousin.
strojnjashka [21]

Answer: If your trying to get rid of em. The best way to do that is to put them in the recyling bin and then empty it. Doing that will delete them off your computer so they can't be found.

Explanation: Also keep in mind that whether or not you delete them they'll still be on your hard drive.

6 0
2 years ago
Your friend sends you a computer game. after installing the game on your computer, you realize that it plays very slowly. you kn
dsp73
Memory possibly. Or another pricessor.
8 0
3 years ago
Under which key category do the Page Up and Page Down keys fall?
Fiesta28 [93]
They are called the navigation keys
7 0
3 years ago
Read 2 more answers
I NEED HELP QUICK
Serjik [45]

Answer: keeps confidential documents secure,

displays a GUI, allocates the computer's resources, and retrieves files

Explanation:

The operating system can be defined as the software installed in the system that provides the information and services to the users by controlling the hardware, software resources, and regulates the computer programs. It runs the applications and programs in the system, displays the graphic user interface for the services, stores, manipulates, and retrieves files. It prevents the unauthorized access to the data and programs by using passwords thus provides the security to the system and documents.

8 0
2 years ago
Which two approaches optimize test maintenance and support future declarative configuration changes? Choose 2 answers Create a m
patriot [66]

Answer:

B and C

Explanation:

B. Create a method that load valid account records from a static resource, then call this method within test method

C. Create a method that creates valid records, then call this method within test methods

3 0
2 years ago
Other questions:
  • Web pages with personal or biograpic information are called ​
    10·1 answer
  • SOMEONE PLEASE HELP ASAP!!
    14·2 answers
  • What is the formula for calculating the average of cells<br> C2 through C30?
    15·1 answer
  • Interest rate risks would be most relevant to what purchase?
    7·2 answers
  • Recording music using a keyboard controller is commonly accomplished using which type of audio file format?
    13·1 answer
  • Which of the following could be defined as a general-purpose computing device that enables workers to create, manage, store, sea
    12·1 answer
  • A collection of facts can be copyrighted, but only if the collection is ____ in a way that causes the resulting work to rise to
    14·1 answer
  • Wich technology can a website use to allow you to listen to a concert live over the internet?
    10·1 answer
  • True or False: <br> The object reference can be used to polymorphically store any class in Java.
    13·1 answer
  • (Print distinct numbers) Write a program that reads in integers separated by a space in one line and displays distinct numbers i
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!