The information that antivirus software uses to identify and remove malware is referred to as a virus ____.

A. flag
B. signature
C. definition
D. scan


Answer: C

Computer Science & Information Technology

You might also like to view...

When you click the Finish button in the Report Wizard, the report is displayed in a window.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Why do many programmers consider multiple inheritance to be a difficult concept?

What will be an ideal response?

Computer Science & Information Technology

In program design, a function that direct data away from a central transform is classified as a(n) ____.

A. afferent B. efferent C. input   D. output E. transform

Computer Science & Information Technology

Systems investigation is the systems development life cycle phase where system components are assembled and the new system is placed into operation.

a. true b. false

Computer Science & Information Technology