1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ASHA 777 [7]
3 years ago
10

Can your computer become infected with a virus via email

Computers and Technology
1 answer:
Oxana [17]3 years ago
4 0
Yes, it is possible to get a virus just by opening an e-mail only if your e-mail client allows scripting. You commonly get the virus if you click a link or an attachment from the e-mail.
You might be interested in
90 POINTS Hazel is working with a database to help determine if the company she works for is making or losing money. Hazel has o
VikaD [51]

Answer:

a

Explanation:

5 0
2 years ago
Read 2 more answers
Rain forests clean the air by producing oxygen. Some rain forest plants have healing properties, and can be used as medicine. Ra
Alla [95]

Answer:

The answer is C. Rain Forests are important for many reasons

Explanation:

7 0
2 years ago
Which arcade game, released in 1972, is considered to be the first to be commercially successful?.
nikitadnepr [17]

Answer:

Pong

Explanation:

Pong

4 0
2 years ago
Cisco has created a proprietary layer 2 protocol used to manage VLAN configuration between switches called:________a. VLAN Confi
Reil [10]

Answer:

The correct answer is letter "E": None of the above.

Explanation:

The VLAN Trunking Protocol (<em>VTP</em>) provides an easy way of keeping an accurate VLAN configuration through a commuted network. The VTP allows solutions of commuted network easily scalable to other dimensions, reducing the need of manually setting up the red. The VTP composed of a layer 2 protocol used to manage VLAN setups between switches.

7 0
3 years ago
​ A wire service is also known as a ____.
charle [14.2K]
The answer is C press agency
4 0
3 years ago
Other questions:
  • In the database below, the arrow is pointing to a _____.<br> file<br> record<br> field<br> key field
    12·1 answer
  • Kim is creating a one-page presentation in Word about her parents’ home country, Vietnam. She has inserted images that are each
    7·2 answers
  • The entirety of a packet at one layer becoming the payload section at another layer is known as
    8·2 answers
  • Technician a says that the above illustration shows one method used to keep the chain tension tight in an indirect drive camshaf
    8·2 answers
  • The program processes the command line arguments. The arguments indicate which signals to catch:________. A. The program emits a
    10·1 answer
  • What is the gauge manifold made of
    14·1 answer
  • Clarice is an architect who is involved in design work on a restaurant in a building that used to be part of the city’s water wo
    8·1 answer
  • What are the features of a computer speaker​
    10·1 answer
  • Rosa is building a website for a multimedia company. She wants to add a drop-down menu functionality to the website's main page.
    12·1 answer
  • Fields &amp; Methods
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!