The information that antivirus software uses to identify and remove malware is referred to as a virus ____.
A. flag
B. signature
C. definition
D. scan
Answer: C
Computer Science & Information Technology
You might also like to view...
When you click the Finish button in the Report Wizard, the report is displayed in a window.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Why do many programmers consider multiple inheritance to be a difficult concept?
What will be an ideal response?
Computer Science & Information Technology
In program design, a function that direct data away from a central transform is classified as a(n) ____.
A. afferent B. efferent C. input D. output E. transform
Computer Science & Information Technology
Systems investigation is the systems development life cycle phase where system components are assembled and the new system is placed into operation.
a. true b. false
Computer Science & Information Technology