The list of virus signatures that your antivirus program can recognize is called the _______________.

Fill in the blank(s) with the appropriate word(s).


definition file

correct

Computer Science & Information Technology

You might also like to view...

Scanners were originally developed to aid security professionals and system administrators in examining networks for security vulnerabilities.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Uppercase, Lowercase, and Sentence case are all options in the ________ tool

Fill in the blank(s) with correct word

Computer Science & Information Technology

A comparison operator in Access is used to evaluate the relationship between two primary keys

Indicate whether the statement is true or false

Computer Science & Information Technology

A popular technique for investigating causes and effects is called a _____ diagram.?

A. ?causebone B. ?fishbone C. ?jawbone D. ?crossbone

Computer Science & Information Technology