Which antivirus technique intercepts a virus when it starts and stops it from infecting other files?

a. Signature scanning
b. Heuristic scanning
c. Integrity checking
d. Activity blocking


ANS: D

Computer Science & Information Technology

You might also like to view...

The Go To tab enables you to search through your document by page numbers, tables, graphics, or a number of other objects, including footnotes

Indicate whether the statement is true or false

Computer Science & Information Technology

A(n) panel contains related commands, controls, and information about different aspects of working with Dreamweaver.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is the proper way to set paths for multiple objects? Assume that the objects to be put on a path are named path1span and path2span .

a. ``` ID = "P1" oID = "P2" ``` b. ``` ``` c. ``` CLASSID = "CLSID:D7A7D7C3-D47F-11D0-89D3-00A0C90833E6"> ``` d. ``` CLASSID = "CLSID:D7A7D7C3-D47F-11D0-89D3-00A0C90833E6"> ID = "P2" ```

Computer Science & Information Technology

State whether the following are true or false. If the answer is false, explain why.

1) The stream member function good returns true if the bad, fail and eof member functions all return false. 2) The cin stream normally is connected to the display screen. 3) If a nonrecoverable error occurs during a stream operation, the bad member function will return true. 4) Output to cerr is unbuffered and output to clog is buffered.

Computer Science & Information Technology