An antivirus technique that is used in conjunction with signature-based scanning and terminate-and-stay-resident monitoring is ____.?
A. ?integrity checking
B. ?time division
C. ?direct sequence
D. ?frequency hopping
Answer: A
You might also like to view...
Assume the file Alphabet.txt contains 26 records, the lowercase letters of the alphabet in ascending order. What is stored in Target.txt after the following code is executed?
``` Dim letter As String Dim sr As IO.StreamReader = IO.File.OpenText("lphabet.txt" Do While Not sr.EndOfStream Dim sw As IO.StreamWriter = IO.File.CreateText("arget.txt" letter = sr.ReadLine sw.WriteLine(letter) sw.Close() Loop sr.Close() ``` (A) The alphabet in descending order. (B) The alphabet in ascending order. (C) a (D) z
The basic generic functional interface ________ in package java.util.function contains method apply that takes a T argument and returns a value of type R. Calls a method on the T argument and returns that method’s result.
a. Consumer
When you copy information from Word to PowerPoint, Word is the ________ file
A) destination B) derivative C) target D) source
Match the following terms to their meanings:
I. criterion II. filter III. normalization IV. comparison operator V. foreign key A. process of grouping data into correct tables B. display of a subset of records C. evaluates the relationship between two quantities D. number, text phrase, or expression used to select records from a table E. a field in one table that is the primary key in another table