1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ASHA 777 [7]
3 years ago
10

Can your computer become infected with a virus via email

Computers and Technology
1 answer:
Oxana [17]3 years ago
4 0
Yes, it is possible to get a virus just by opening an e-mail only if your e-mail client allows scripting. You commonly get the virus if you click a link or an attachment from the e-mail.
You might be interested in
_ includes websites that encourage interaction and connection among people, businesses, and organizations. A. News sites B. Sear
Dovator [93]
> News sites give information about news or what is trending around the area or world (CNN, Fox, MSNBC, etc) 

> Search engines is what allows you to look up websites (Google, Bing, Yahoo, etc) 

> Social media AKA Social Networking sites is interaction social sites where you connect with various people from around the world. (Facebook, Twitter, Google+, etc)

>Apps is short for applications which is an application that has a specific function (Games, Music, Social networking) 

So based on this, you answer is C. Social Media
6 0
3 years ago
Read 2 more answers
How do you use loops in code?
Keith_Richards [23]

Answer:

A loop in a computer program is an instruction that repeats until a specified condition is reached. In a loop structure, the loop asks a question. If the answer requires action, it is executed. ... A computer programmer who needs to use the same lines of code many times in a program can use a loop to save time

Explanation:

4 0
3 years ago
Which type of disease cannot be spread from one person to another
marusya05 [52]

<u>non-infectious, non-communable</u>. It means that they can't spread. I hope that helps! Also, and example of this non-infectious disease would be diabtetes, as in, if you're next to a person that has it, you won't get it lol.

6 0
3 years ago
Read 2 more answers
Why should technology be used. No plagiarism pls.
olga nikolaevna [1]

Answer:

Explanation:

mobile devices and the applications they help us in life devisec can individualize instruction. three specific reasons that technology is good is that it saves lives by improving medicine, keeps us connected to each other, and provides education and entertainment. One reason why technology is good is that it has saved many lives.

3 0
3 years ago
Read 2 more answers
As each layer of the OSI model adds its encapsulation header and/or footer, the ______ gets larger until it reaches the physical
aleksklad [387]

Answer:

Message

Explanation:

  • The Application layer creates a message. The Application layer passes the message to the Presentation layer.
  • The Presentation layer encapsulates the message by adding information to it. Information is usually added only at the beginning of the message (called a header); however, some layers also add material at the end of the message (called a footer)
  • The process of passing the message down and adding layer-specific information continues until the message reaches the Physical layer.
  • At the Physical layer, the message is converted into electrical impulses that represent bits and is transmitted over the physical connection.  
  • The receiving computer captures the bits from the physical connection and re-creates the message in the Physical layer.  
  • The Physical layer converts the message from bits into a Data Link frame and sends the message up to the Data Link layer.
  • The Data Link layer strips its information and sends the message up to the Network layer.
  • This process of deencapsulation is performed until the message reaches the Application layer.
  • When the message reaches the Application layer, the data in the message is sent to the intended software recipient.
5 0
3 years ago
Other questions:
  • Which method allows a computer to react accordingly when it requests data from a server and the server takes too long to respond
    5·1 answer
  • Where is authorization management app on tablet?
    7·1 answer
  • Why might your digital footprint be important when you are applying for collage
    13·1 answer
  • What two technologies below are hybrid processors that can handle 32 bit and 64 bit operating systems natively?
    11·1 answer
  • Natalie is a secretary and must complete a large amount of filing this afternoon. At 1:00 PM, the office receptionist gets sick
    10·1 answer
  • A computer virus is a program that can copy itself and infect a computer without the permission of the owner. How do you think a
    9·1 answer
  • What kind of image does this photograph represent?
    14·2 answers
  • 6. At age 17, what was Minhaj's definition of the American Dream?
    8·1 answer
  • The term packet is used fairly generically to refer to protocol data unit (PDU). There are PDU equivalent names in the different
    15·1 answer
  • Choose the tag required for each stated goal.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!