Which virus scanning technique checks files on your system to see whether they match any known virus?
A) File scanning
B) Active code scanning
C) Instant messaging scanning
D) E-mail and attachment scanning
A) File scanning
Computer Science & Information Technology
You might also like to view...
When you use a subscript not within the range of acceptable subscripts, your subscript is said to be ____.
A. out of range B. out of area C. out of bounds D. out of series
Computer Science & Information Technology
When you declare a variable, it should have a different interface name from the type name.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Describe the purpose of domain analysis modeling in your own words.
What will be an ideal response?
Computer Science & Information Technology
With one-dimensional arrays, what indicates the variable's position within the array?
A. a pointer B. the subscript C. a counter D. the array initializer
Computer Science & Information Technology