1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mrac [35]
3 years ago
13

Which email attachments are generally safe to open

Computers and Technology
2 answers:
Arlecino [84]3 years ago
5 0
Anything starting in https://
ycow [4]3 years ago
3 0

Answer:

i would suggest not opening ones that start with bit . ly

Explanation:

pls mark brainliest

You might be interested in
A large, closet-sized computer capable of simultaneously processing data for hundreds or thousands of users is most likely a ___
Feliz [49]

Answer:

The correct answer is <u>mainframe</u>

I hope this helps! ^-^

4 0
2 years ago
________ feature full-time monitoring tools placed at the most vulnerable points, or "hot spots", of corporate networks to prote
Blizzard [7]
Intrusion Detection Systems feature full-time monitoring tools placed at the most vulnerable points, or "hot spots", of corporate networks to protect against suspicious network traffic and attempts to access files and databases. It  <span>generates an alarm if it finds a suspicious or anomalous event. </span>
4 0
3 years ago
Two middle-order batsmen are compared based on their performance in their previous cricket match.
Zolol [24]
How many points is this for
5 0
4 years ago
A major concern about ESP claims is that proponents explain both the positive and negative findings. By explaining the negative
4vir4ik [10]

Answer: Falsifiability

Explanation: Falsifiability is the term that is defined as the evaluation of any particular hypothesis or theory to be proven wrong .This feature gives the access that the theory can be tested and have more accurate claims .

The ESP(Extrasensory perception) theory  can also have feature of being falsifiable because the experiments and test lead to the issue that the negative effects of the theory are not certain which might occur due to simple observation of effects.

5 0
4 years ago
Select the true statement about a scanner.
Mandarinka [93]

Answer:

c. It is an input device that enables users to convert hard copies to digital images or text.

Explanation:

An input device can be defined as any device that is typically used for sending data to a computer system.

A scanner can be defined as an input device designed for transferring informations and images from hardcopy (physical) documents to digital computer files. Thus, it's simply an electronic input device that is used to digitally scan or copy data (informations) from a hardcopy document such as photographs, paper files, printed texts etc and then converted to a digital computer file in formats such as png, or jpeg. The scanner is a device which avail users the ability and opportunity to view, edit and transfer hardcopy document on a computer system in soft-copy.

Majority of the scanners used around the world are flatbed scanners and as such have a flat glass surface for scanning documents.

Basically, all scanners are to be used with a device driver software pre-installed on the computer before the configuration of the scanner.

Other types of scanners are drum scanners, contact image sensor (CIS) scanner, CCD scanner, planetary scanner, 3D scanner, Roller scanner etc.

6 0
3 years ago
Other questions:
  • Write a program whose input is two integers and whose output is the two integers swapped. Place the values in an array, where x
    12·1 answer
  • Each peripheral device has its own software, called a(n) ____, which contains the detailed instructions required to start that d
    6·1 answer
  • You have begun a new project and want to keep all of the work you're doing on the project in its own directory. You will create
    8·2 answers
  • Define application pakage​
    5·2 answers
  • A digital device Select one: a. uses electricity to run it. b. uses symbolic representations of data in the form of code. c. req
    7·1 answer
  • What term identifies the physical interface between a computer and its peripherals?
    5·1 answer
  • To properly insert a memory module, you must locate the direction of the ______ .
    14·1 answer
  • In java, a class that is defined without an explicit extends clause ____.
    15·2 answers
  • b) Derive the logic expressions for the incrementor and 7-sgement decoder. Since software can perform gate-level optimization, y
    7·1 answer
  • What does a codec do? Choose all that apply.
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!