1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
3 years ago
5

Need help not sure if I’m correct

Computers and Technology
1 answer:
makkiz [27]3 years ago
5 0

Answer:

It's probably correct

You might be interested in
Memememememmemememememememmmeememememe
Alexus [3.1K]

l o l l o l l o l ha ha ha ha ha l o l

7 0
3 years ago
What do to keep in a database
igor_vitrenko [27]
<span>Customer Relationship Management is really important for many businesses, in particular, small ones, as it is the focus point of sales and marketing strategies. At the centre of a business’ CRM is their customer database, which is a really helpful tool enabling them to; identify customer trends, create customer loyalty and increase their customer communication. All businesses have a customer database, whether it is a computerised system or a piece of paper with names and details written on. Here are some tips on how to create and maintain your database in order to get the most out of it.</span>
5 0
3 years ago
Read 2 more answers
Google is an example of a(n):
bixtya [17]
It would B, because anytime you search it always pulls up google search engine.
8 0
3 years ago
Read 2 more answers
Cindy visits her favorite website on a lunch break using a hospital computer. After she downloads a file, she notices that the c
TiliK225 [7]

<u>Explanation:</u>

<em>Remember, </em>Malware is a word coined from the words Malicious-Software (Mal...ware). Thus, Malware could be defined as software that is intentionally designed by cybercriminals to gain access or cause damage to a computer or network.

a. Cindy may learn the difference between these two techniques used to create a malware attack:

  • through downloads from malicious websites: An attacker may design a malicious website; in which unsuspecting users who visit the site may click to download certain files, but these are actually malware software been installed.
  • through malicious emails: This email may contain attachments which if opened or downloaded by an unsuspecting user would infect their computer with malware.

b. Here are some common suggestions;

  • Never open attachments from strange email addresses.
  • install a paid antivirus software.
  • be mindful of websites with too many ads.
4 0
3 years ago
20
denis-greek [22]

Answer:

true

Explanation:

because my 8 ball said so

6 0
4 years ago
Other questions:
  • Which tab provides commands for the most commonly used elements in Word software?
    15·1 answer
  • Which statement about dialogues is NOT correct? Select one: A. Users should be able to control the direction of speed of dialogu
    5·1 answer
  • You have been handed a mysterious piece of data by an unknown person. Judging by his shifty eyes and maniacal laughter you don't
    12·1 answer
  • Write a program using integers userNum and x as input, and output userNum divided by x four times. Ex: If the input is: 2000 2
    15·1 answer
  • Can anyone please help me to solve this question?
    10·1 answer
  • According to the video, what kinds of projects would Computer Programmers be most likely to work on? Check all that apply.
    13·2 answers
  • Please help ASAP!
    15·1 answer
  • How to write cube of a number from flowchart ​
    5·1 answer
  • What are the methods used in research methodology?
    12·1 answer
  • Write a loop that continually asks the user what pets the user has until the user enters stop, in which case the loop ends. It s
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!