Which virus scanning technique checks files on your system to see whether they match any known virus?

A) File scanning
B) Active code scanning
C) Instant messaging scanning
D) E-mail and attachment scanning


A) File scanning

Computer Science & Information Technology

You might also like to view...

When you use a subscript not within the range of acceptable subscripts, your subscript is said to be ____.

A. out of range B. out of area C. out of bounds D. out of series

Computer Science & Information Technology

When you declare a variable, it should have a different interface name from the type name.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Describe the purpose of domain analysis modeling in your own words.

What will be an ideal response?

Computer Science & Information Technology

With one-dimensional arrays, what indicates the variable's position within the array?

A. a pointer B. the subscript C. a counter D. the array initializer

Computer Science & Information Technology