Which virus scanning technique uses rules to determine if a file or program is behaving like a virus?
A) Heuristic scanning
B) Active code scanning
C) Instant messaging scanning
D) Email and attachment scanning
A) Heuristic scanning
Computer Science & Information Technology
You might also like to view...
Which CSS property configures the capitalization of text?
a. font-type b. text-transform c. text-decoration d. font-weight
Computer Science & Information Technology
The process of inserting a chart in your document so that it becomes a part of a Word document is known as:
A) pasting. B) embedding. C) pinning. D) inserting.
Computer Science & Information Technology
Arcs, hearts, and stars are examples of PowerPoint ________
A) motion paths B) action buttons C) triggers D) animation effects
Computer Science & Information Technology
Muchas personas le llaman documento a cualquier archivo creado en una computadora. En Office, un documento se crea en Excel.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology