How does an anti-virus program act as a sword (i.e., in active seek-and-destroy mode) in protecting a PC?

What will be an ideal response?


Computer Science & Information Technology

You might also like to view...

You are designing a loop that is to exit only if the values of both x and y are 0. Which of the following would you use for your loop repetition condition?

a. x != 0 && y != 0 b. x != 0 || y != 0 c. !(x != 0) || !(y != 0) d. x == 0 && y != 0

Computer Science & Information Technology

A(n) _____________ changes the order in which instructions are carried out by directing the computer to execute a statement elsewhere in the program.

A. sequential execution B. formal method C. programming paradigm D. sequence control structure

Computer Science & Information Technology

All of the following are considered characteristics of a SOHO network EXCEPT:

A. simple design (usually) B. wide variety of enterprise-level services and servers C. a minimal number of switches, routers, servers, and workstations D. standardization of operating systems

Computer Science & Information Technology

Why does security depend on more than technologies?

What will be an ideal response?

Computer Science & Information Technology