Which virus scanning technique uses rules to determine if a file or program is behaving like a virus?

A) Heuristic scanning
B) Active code scanning
C) Instant messaging scanning
D) Email and attachment scanning


A) Heuristic scanning

Computer Science & Information Technology

You might also like to view...

Which CSS property configures the capitalization of text?

a. font-type b. text-transform c. text-decoration d. font-weight

Computer Science & Information Technology

The process of inserting a chart in your document so that it becomes a part of a Word document is known as:

A) pasting. B) embedding. C) pinning. D) inserting.

Computer Science & Information Technology

Arcs, hearts, and stars are examples of PowerPoint ________

A) motion paths B) action buttons C) triggers D) animation effects

Computer Science & Information Technology

Muchas personas le llaman documento a cualquier archivo creado en una computadora. En Office, un documento se crea en Excel.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology