If you receive an e-mail attachment, you should use a(n) ____ program to verify that the attachment is virus free.

A. firewall
B. encryption
C. decryption
D. antivirus


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following ways to format text into columns fills the left column entirely with text and then continues the text into the next column?

A. edit column B. tabs C. tables D. columns

Computer Science & Information Technology

The ________ is normally located in the lower-left desktop corner and is used to access files, obtain help, launch applications, and add/remove hardware

A) Start button B) Taskbar C) Notification area D) Recycle Bin

Computer Science & Information Technology

What is the passive process of finding information on a company's network called?

A. footprinting B. searching C. calling D. digging

Computer Science & Information Technology

When programming in C you’ll typically use all of the following building blocks except __________.

(a) functions from the standard library (b) functions you create yourself (c) functions other people have created for you (d) functions provided by ANSI / ISO

Computer Science & Information Technology