1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldenfox [79]
2 years ago
14

A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c

oworker recalls there is a setting in the Internet Options dialog box to prompt the user before downloading ActiveX controls, but can't remember which tab to use. Which of the following tabs will you suggest to the coworker?
a. Security tab
b. Privacy tab
c. General tab
d. Programs tab
Computers and Technology
1 answer:
RoseWind [281]2 years ago
5 0

Answer:

A

Explanation:

Security tab is the option where you get to control how the activeX add-on works.

Cheers

You might be interested in
// In this exercise, you will be given a variable, it will be called: value
rjkz [21]

Answer:

import java.util.Scanner;

public class Solution {

   public static void main(String args[]) {      

     Scanner scan = new Scanner(System.in);

     System.out.println("Enter your value");

     int value = scan.nextInt();      

     greaterThanFive(value);

   }  

   public static void greaterThanFive(int userInput){

       System.out.println(userInput > 5);

   }

}

Explanation:

The first line import the Scanner which is use to enable to accept user input.

The class is defined as Solution in the next line. The main method is declared in the next line which signify the beginning of the program.

Then, a scanner object is declared called scan in the next line. Then a prompt is display to the user to input a value. The user input is stored in the variable value. The value is then passed to the method greaterThanFive.

The method greaterThanFive is declared and have just one parameter, the userInput. Inside the method, we output if the userInput is greater than 5 using the logical operator (>).

8 0
2 years ago
When a customer places an order atBookBox.com, the company processesthe customer's payment information,sends the order to the ne
mash [69]

Answer:

fulfillment management process

Explanation:

According to my research on the different business process', I can say that based on the information provided within the question this is best described as the fulfillment management process. Which is the process that a company goes through from accepting an order to delivering that order to the client. Which is what is happening in this situation.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
Please help to question 16 and 17 please
Y_Kistochka [10]
17.incorrect code........................sorry I'm not sure about number 16
5 0
3 years ago
7.4.4: Length of User's Name
Natalija [7]

Answer:

user_name = input("input user name: ")
print(len(user_name))

Explanation:

input - input function in python

len - length of value

print - print data

6 0
2 years ago
Please help me with this question ​
Anna35 [415]

Answer:

for this, u will have to put what u already know into a few stanzas and turn it in. hope this helps.

7 0
2 years ago
Other questions:
  • Keyboards that are widely used on various smartphones and other small portable devices, and which are designed primarily for com
    15·1 answer
  • What is the Most popular game out today?
    6·2 answers
  • In a study on software license infringement, those from United States were significantly more permissive than those from the Net
    15·1 answer
  • You have the templates of 2 classes, Person and Program. The Person class has 4 attributes, name, age, major and gpa. There is a
    7·1 answer
  • Henry conducted a survey on an ad done by his company. In the survey, he asked people to evaluate the ad and state whether they
    8·1 answer
  • ___ design uses the same webpage content, but applies styling depending on the viewport size of the device
    11·1 answer
  • Hardware refers to programs and protocols used on a computer system.<br><br> True<br> False
    8·2 answers
  • The following pieces are known as (image shown above)
    15·2 answers
  • How many 60 KB jpeg files can be stored on a 2 MB folder in your hard drive?​
    7·1 answer
  • What command utilizes the limpel-ziv (lz77) compression algorithm and achieves a compression ratio of 60-70 percent?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!