A series of unique bytes that identifies a virus and distinguishes it from legitimate files on your PC is called a ____.

A. signature
B. virus signature
C. stamp
D. worm


Answer: B

Computer Science & Information Technology

You might also like to view...

The ________ head retrieves data from the disk

Fill in the blank(s) with correct word

Computer Science & Information Technology

To monitor who is logged in to a UNIX/Linux systems, use the ____ command.

A. top B. who C. free D. df

Computer Science & Information Technology

When you draw a smooth point, ____________________ handles determine the flow of the path.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A(n) ________ allows you to build a what-if analysis model that includes variable cells linked by one or more formulas or functions

Fill in the blank(s) with correct word

Computer Science & Information Technology