An antivirus technique that is used in conjunction with signature-based scanning and terminate-and-stay-resident monitoring is ____.?

A. ?integrity checking
B. ?time division
C. ?direct sequence
D. ?frequency hopping


Answer: A

Computer Science & Information Technology

You might also like to view...

Assume the file Alphabet.txt contains 26 records, the lowercase letters of the alphabet in ascending order. What is stored in Target.txt after the following code is executed?

``` Dim letter As String Dim sr As IO.StreamReader = IO.File.OpenText("lphabet.txt" Do While Not sr.EndOfStream Dim sw As IO.StreamWriter = IO.File.CreateText("arget.txt" letter = sr.ReadLine sw.WriteLine(letter) sw.Close() Loop sr.Close() ``` (A) The alphabet in descending order. (B) The alphabet in ascending order. (C) a (D) z

Computer Science & Information Technology

The basic generic functional interface ________ in package java.util.function contains method apply that takes a T argument and returns a value of type R. Calls a method on the T argument and returns that method’s result.

a. Consumer b. Function c. Supplier d. BinaryOperator

Computer Science & Information Technology

When you copy information from Word to PowerPoint, Word is the ________ file

A) destination B) derivative C) target D) source

Computer Science & Information Technology

Match the following terms to their meanings:

I. criterion II. filter III. normalization IV. comparison operator V. foreign key A. process of grouping data into correct tables B. display of a subset of records C. evaluates the relationship between two quantities D. number, text phrase, or expression used to select records from a table E. a field in one table that is the primary key in another table

Computer Science & Information Technology