The list of virus signatures that your antivirus program can recognize is called the _______________.
Fill in the blank(s) with the appropriate word(s).
definition file
correct
Computer Science & Information Technology
You might also like to view...
Scanners were originally developed to aid security professionals and system administrators in examining networks for security vulnerabilities.?
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Uppercase, Lowercase, and Sentence case are all options in the ________ tool
Fill in the blank(s) with correct word
Computer Science & Information Technology
A comparison operator in Access is used to evaluate the relationship between two primary keys
Indicate whether the statement is true or false
Computer Science & Information Technology
A popular technique for investigating causes and effects is called a _____ diagram.?
A. ?causebone B. ?fishbone C. ?jawbone D. ?crossbone
Computer Science & Information Technology