If you receive an e-mail attachment, you should use a(n) ____ program to verify that the attachment is virus free.
A. firewall
B. encryption
C. decryption
D. antivirus
Answer: D
You might also like to view...
Which of the following ways to format text into columns fills the left column entirely with text and then continues the text into the next column?
A. edit column B. tabs C. tables D. columns
The ________ is normally located in the lower-left desktop corner and is used to access files, obtain help, launch applications, and add/remove hardware
A) Start button B) Taskbar C) Notification area D) Recycle Bin
What is the passive process of finding information on a company's network called?
A. footprinting B. searching C. calling D. digging
When programming in C you’ll typically use all of the following building blocks except __________.
(a) functions from the standard library (b) functions you create yourself (c) functions other people have created for you (d) functions provided by ANSI / ISO