1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mrac [35]
2 years ago
13

Which email attachments are generally safe to open

Computers and Technology
2 answers:
Arlecino [84]2 years ago
5 0
Anything starting in https://
ycow [4]2 years ago
3 0

Answer:

i would suggest not opening ones that start with bit . ly

Explanation:

pls mark brainliest

You might be interested in
Do laws ever change to help enforce cyber hacking crimes
prisoha [69]
No I don’t think so personally
5 0
2 years ago
Read 2 more answers
Universal Windows Platform is designed for which Windows 10 version?
Naddika [18.5K]

Universal Windows Platform is an open source API created by Microsoft and first introduced in Windows 10. The purpose of this platform is to help develop universal apps that run on Windows 10, Windows 10 Mobile, Xbox One and HoloLens without the need to be re-written for each. It supports Windows app development using C++, C#, VB.NET, and XAML. The API is implemented in C++, and supported in C++, VB.NET, C#, F# and JavaScript. Designed as an extension to the Windows Runtime platform first introduced in Windows Server 2012 and Windows 8, UWP allows developers to create apps that will potentially run on multiple types of devices.

6 0
3 years ago
If a document reaches you, and requires you to perform some action, you should do it immediately if ________.
ankoles [38]
<span>You should do it if C. it will take less than two minutes to complete </span>
6 0
3 years ago
Read 2 more answers
What method does a GSM network use to separate data on a channel?
Sergeu [11.5K]

Answer: TDMA(Time division multiple access)

Explanation: Time-division multiple access is the method that is used by GSM(Global system for mobile communication) usually for the separation process of the data.It is a way in which a same frequency is shared by different time slots of signal.It has high flexibility and so thus is helpful for the GSM network and provides easy services of division.It divides the data according to the time period slots in a GSM network.

4 0
3 years ago
What is one way to establish a team's velocity?
S_A_V [24]

Look at the average Story points completed from the last Iterations.

How To Improve Team Velocity?

Velocity cannot be used to compare teams, as all the teams are different. It also says nothing about how hard the team is working. Velocity is more about efficiency. Velocity should be treated as a team thing, not as an individual one. Some steps to improve team velocity are:

  • Care about team spirit
  • Set clear goals
  • Team members to work on one work at a time
  • Avoid unnecessary steps in the process
  • No micromanagement
  • Define The Process That Is Clear For Everyone
  • Keep Track Of Tech Debt. The team should regularly work on it, to avoid risks and quality problems in the future.
  • Focus On Quality, Not Speed. This will help to reduce the fixes, refactoring time, and increase productivity.
  • Do Not Load The Team Too Much.

To know more about Team Velocity, click on:

brainly.com/question/28174889

#SPJ1

8 0
1 year ago
Other questions:
  • "what is the name of the ipsec configuration file"
    9·1 answer
  • What is the most powerful gpu or known as the graphics card in the world?
    8·2 answers
  • Write a program that produces this output:
    10·1 answer
  • To save and store data separate from a computer, it helps to have an
    15·2 answers
  • Which tabs contains options for adding shapes to a chart ? Check all that apply.
    13·1 answer
  • Before the electronic era information was usually directly communicated and not recorded, much of the information you received w
    9·1 answer
  • Which cell formatting is most likely to use $?
    5·1 answer
  • In Java, Create a two part program. The first takes a user inputted number and lists the factors. The second, lists all the prim
    12·1 answer
  • Compare and contrast hardware and software.
    11·2 answers
  • Criminal investigations are limited to finding data defined in the search ____.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!