1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldenfox [79]
3 years ago
14

A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c

oworker recalls there is a setting in the Internet Options dialog box to prompt the user before downloading ActiveX controls, but can't remember which tab to use. Which of the following tabs will you suggest to the coworker?
a. Security tab
b. Privacy tab
c. General tab
d. Programs tab
Computers and Technology
1 answer:
RoseWind [281]3 years ago
5 0

Answer:

A

Explanation:

Security tab is the option where you get to control how the activeX add-on works.

Cheers

You might be interested in
Which of the following binary numbers is equivalent to decimal 4?
melomori [17]

Answer:

b so easy

Explanation:

5 0
3 years ago
Read 2 more answers
list the sixth external parts of a computer system and identify which are output and which are input devices
Marianna [84]
<em>Keyboard -----> Input device</em>
<em>Printer  --------> Output device</em>
<em>mouse ---------> Input device</em>
<em>Monitor --------> Output device</em>
<em>CD roam ------> Input device</em>
<em>Projector ------> Output device</em>
4 0
3 years ago
Read 2 more answers
Pat creates a table in a spread sheet
Anna11 [10]

Answer:

Explanation:

Details?

7 0
4 years ago
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
postnew [5]

Answer: Computers as target

Explanation:

Whenever an authorized  access is made into a system it is a form of crime and it is called computers as target whereby one is able to access the system and get hands on unauthorized data and can also manipulate various activities which will have many dangerous effects.

8 0
3 years ago
In portrait mode, your camera will use what?
vesna_86 [32]

Answer:

A. A Smaller Aperture

Have A Good Day

3 0
3 years ago
Other questions:
  • What makes sqlite an appropriate choice for an android application, compared to other relational database management systems, su
    15·1 answer
  • To edit the text in a smartart graphic, what must be done first ?
    7·2 answers
  • The entirety of a packet at one layer becoming the payload section at another layer is known as
    8·2 answers
  • On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?
    15·1 answer
  • In order to recover from an attack on any one server, it would take an estimated 14 hours to rebuild servers 1, 2, 3, and 4 and
    6·1 answer
  • Sue needs to add a header and a footer to a presentation. Which process should she use to do this?
    10·2 answers
  • The thinner the thread on the screw, the ______the force needed but the _____the distance.
    15·1 answer
  • What are the characteristics of good blogs?
    8·1 answer
  • Universal Containers uses a custom object within the product development team. Product development, executives, and System Admin
    11·1 answer
  • how does the use of data abstraction manage complexity in program code? how does using lists make a program easier to develop an
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!