1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kompoz [17]
2 years ago
5

You downloaded a picture that a friend sent you on social media, but when you opened it, you noticed that another unfamiliar pro

gram was downloaded as well. What attack are you a victim of?
Phishing

Malware
Computers and Technology
1 answer:
solmaris [256]2 years ago
3 0

Answer:

Malware.

Explanation:

You might be interested in
Explain cell reference and its types with examples?​
skad [1K]

Answer:

There are two types of cell references: relative and absolute. Relative and absolute references behave differently when copied and filled to other cells. Relative references change when a formula is copied to another cell. Absolute references, on the other hand, remain constant, no matter where they are copied.

8 0
3 years ago
Which version of windows server 2008 must computer be running to create a failover cluster?
Mrrafil [7]
Windows 7 had this problem
6 0
3 years ago
Who is considered as the father of computer science​
Andru [333]

Answer:

Turing is considered as the father of computer science

4 0
3 years ago
Read 2 more answers
Which of the following is true about speculative risks? a. The risk/return tradeoff is applicable to speculative risks. b. Specu
My name is Ann [436]

Answer:

A) The risk/return Tradeoff is applicable to speculative risks.

Explanation:

Speculative risk always has a positive payoff and also a negative payoff , so option (b) is incorrect.

Speculative risk is a source of great concern for risk managers, so option (c)is incorrect.

Speculative risk is a category of risk that can be taken on voluntarily and will either result in a profit or loss , so option d is wrong

Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if it occurs: loss. Pure risk includes such incidents as natural disasters, fire or untimely death. so option (e) also incorrect

7 0
3 years ago
6-3.1 After visiting a large number of Web sites to complete your research for a lengthy research paper, your computer begins to
vodomira [7]

Answer:

Spyware

Explanation:

To be safe of spyware, be careful of websites you visit, as it can detect many things on your system/phone such as text messages you send and receive, your call history, and your location.

Cheers

7 0
3 years ago
Read 2 more answers
Other questions:
  • What is the best Graphics Card you can get in a Gaming Computer? Also what is the RAM do in a Comptuer
    6·1 answer
  • IT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally,
    11·1 answer
  • The company database may be stored on a central database server and managed by a database adminstrator true or false
    12·1 answer
  • Rewrite this if/else if code segment into a switch statement int num = 0; int a = 10, b = 20, c = 20, d = 30, x = 40; if (num &g
    13·1 answer
  • You are required to write a calculator for Geometric shapes(Circle, Square, and Rectangle). The basic idea is that you willprovi
    7·1 answer
  • Complete the sentence.
    14·1 answer
  • Justify any FOUR significant factors to remember when installing your motherboard
    7·1 answer
  • Write a paragraph about ICT in personal life?
    12·1 answer
  • Como se llaman las herramientas y maquinas pque utilizan para hacer cosas artesanales
    10·1 answer
  • What kind of goal does ariel set when he works to graduate from high school in four years? short term long term normative fantas
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!