1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ASHA 777 [7]
3 years ago
10

Can your computer become infected with a virus via email

Computers and Technology
1 answer:
Oxana [17]3 years ago
4 0
Yes, it is possible to get a virus just by opening an e-mail only if your e-mail client allows scripting. You commonly get the virus if you click a link or an attachment from the e-mail.
You might be interested in
Creating a call conversion in Google Ads and adding a phone snippet to a web page allows advertisers to use a Google forwarding
Marta_Voda [28]

Answer:

Call tracking system

Explanation:

It helps to measure total amount of visitors per month and based on the volume of visitors, it calculates how many phone numbers should be displayed to show a different number for each clique.

5 0
3 years ago
In MS Word we can merga cells true or false​
sergey [27]
In this video I showed you all of the locations for all items in Wacky Wizards!! I hope you enjoyed and please like and subscribe. Piece out!!!
7 0
3 years ago
Read 2 more answers
How does theatre compare with movies or television? What makes it similar to movies and television? What makes it different?
givi [52]

Answer:

you cant mess up in theatre but you can redo scences in movies, thay both have acting in them

Explanation:

im a theatre person

3 0
4 years ago
How does technology influence the development of personal and public identity?
Marysya12 [62]

Answer:

Technology affects the way individuals communicate, learn, and think. It helps society and determines how people interact with each other on a daily basis. Technology plays an important role in society today. It has positive and negative effects on the world and it impacts daily lives.

Hope it's helpful to u

6 0
3 years ago
Timur was making a presentation regarding how attackers break passwords. His presentation demonstrated the attack technique that
kakasveta [241]

Answer:

The answer of the following question is Brute force attack .

Explanation:

A brute force attack is the error and trial method that is used by an application program to decode the encrypted data like passwords or the Data Encryption Standard (DES) keys, which through an exhaustive effort (by using brute force) rather than the employing an intellectual strategies.

7 0
3 years ago
Other questions:
  • Which of the following commands is more recommended while creating a bot?
    9·1 answer
  • Write a class called Counter that represents a simple tally counter, which might be used to count people as they enter a room. T
    9·1 answer
  • Which window allows you to view and change your computer's system information and settings?
    9·2 answers
  • EXCEL 2016:
    8·2 answers
  • What are the four types of technical drawing?​
    9·1 answer
  • The following relation schema can be used to register information on the repayments on micro loans.
    13·1 answer
  • Consider the following program segment: //include statement(s) //using namespace statement int main() { //variable declaration /
    9·1 answer
  • What output is generated by this for loop?
    6·1 answer
  • True or False? Security code is almost always open source!<br> True<br> False
    8·2 answers
  • Posts that you delete
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!