Sarah receives an e-mail from someone she does not know. it has an attachment ending in
.scr. what should she do to prevent threats to her computer's security?​