Antivirus software scans virus signatures in e-mail attachments, ____, and files that you access from USB flash drives, CDs, DVDs, or the Web.

A. uploads
B. copies
C. backups
D. downloads


Answer: D

Computer Science & Information Technology

You might also like to view...

From Nancy's point of view, in order to restrict access, privacy is a zone of:

a) discretion. b) inaccessibility. c) nondisclosure. d) invisibility.

Computer Science & Information Technology

In the context of malware, what is remediation?

What will be an ideal response?

Computer Science & Information Technology

A newly installed floppy drive activity light stays on. Which of the following is the MOST likely problem?

A. The computer does not support this type of drive. B. Connector is plugged in backwards. C. Power is plugged in backwards. D. All floppies are corrupt.

Computer Science & Information Technology

Look at the Happy Cruise Lines database, for this question, consider only the following SHIP, PORT, and PASSENGER relations

Computer Science & Information Technology