1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lemur [1.5K]
3 years ago
8

Describe two measures you can use to evaluate whether an attachment in a message is reliable to open.

Computers and Technology
2 answers:
meriva3 years ago
8 0
<span>If a attachment is not reliable to open, terrible effects can happen, peradventure it may have a virus or even malware that can destroy a computers software. 

To avoid this and stay on the safe side, try the following:-

- Open it in protected view 
- Do not save the attachment on your computer 
- Look at the author and read the message carefully to make sure it is not biased. 
- Open it on a flash-drive </span>
HACTEHA [7]3 years ago
7 0
To have safety measures when opening a file and you dont know if it is reliable or not you should:

Scan the file with an antivirus. ( I prefer Avast )
Open the file in protected view.
Only open the file if you know who sent you the file or where you got it from

You might be interested in
Company-wide systems that connect one or more local area networks (LANs) or wide area networks (WANs) are called _____. a) legac
il63 [147K]

Answer:

The answer is "option c".

Explanation:

A Web-centered view ensures anything has been programmed for the Web app or program. example Webified. This is a definition, that is used for personal use only and all other duplication is strictly forbidden without the approval of the author. and other options are not correct that can be defined as:

  • In option a, the legacy system is a method that is obsoleted today.
  • In option b, The mission-critical systems are used in the navigational system.
  • In option d, A distributed system permits the sharing of information that includes software that is connected with a network.

6 0
3 years ago
Most presentations use text: A. To maximize area and style. B. At a minimum. C. To draw attention to content. D. Without restrai
klemol [59]

The answer is most likely A.


Hope this Helped!


;D

4 0
3 years ago
Read 2 more answers
A document repository is down when you attempt to access it. which isa principle is being violated?
Tju [1.3M]
When a document repository is down when you attempt to access it, the ISA principle Authentication is being violated. The authentication method is done during the log on phase and is performed by the ISA server which requests certificate. <span>The client then needs to send the appropriate client certificate to the server in order to be authenticated and to have access to the document.</span>
3 0
3 years ago
You can run a macro by:
oee [108]

Selecting the button assigned

Using the shortcut Keys assigned

Explanation:

By clicking the assigned button one can run a macro and we can assign a short cut key to macro which we created.

So, the two options we can use to run a macro.

7 0
3 years ago
Who is in the age range of 13-15 and wants to join a mine craft smp?
Ratling [72]

Answer: Wow that's really cool!

3 0
3 years ago
Other questions:
  • The most effective way to perform data entry is to keep your hands on the keyboard and press to move to the text cell in the row
    10·1 answer
  • Write the definition of a function max that has three int parameters and returns the largest.
    6·2 answers
  • What does the minimum password age setting control?
    15·1 answer
  • The national highway system improved economic activity in Georgia by
    6·2 answers
  • Before measuring resistance of a component, be sure:
    8·1 answer
  • Today, scientists agree that good research is ethical in nature and is guided by basic respect for human dignity and safety. How
    6·1 answer
  • A laptop can be kept on palm to work. [true/false) ​
    5·1 answer
  • To find detailed information about the origin of an email message, look at the ________________.
    11·1 answer
  • Which of the following is not an advanced strategy you may use to help you conduct a search on the Internet?
    15·2 answers
  • Numerous engineering and scientific applications require finding solutions to a set of equations. Ex: 8x + 7y = 38 and 3x - 5y =
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!