A series of unique bytes that identifies a virus and distinguishes it from legitimate files on your PC is called a ____.
A. signature
B. virus signature
C. stamp
D. worm
Answer: B
Computer Science & Information Technology
You might also like to view...
The ________ head retrieves data from the disk
Fill in the blank(s) with correct word
Computer Science & Information Technology
To monitor who is logged in to a UNIX/Linux systems, use the ____ command.
A. top B. who C. free D. df
Computer Science & Information Technology
When you draw a smooth point, ____________________ handles determine the flow of the path.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
A(n) ________ allows you to build a what-if analysis model that includes variable cells linked by one or more formulas or functions
Fill in the blank(s) with correct word
Computer Science & Information Technology