Which type of software helps protect against viruses that are attached to e-mail?

A. Firewall software
B. Antivirus software
C. Windows Defender
D. Hardware firewall


Answer: B. Antivirus software

Computer Science & Information Technology

You might also like to view...

Given the following class declaration,

class Rational { public: Rational(); Rational(int numer, int denom); int getNumerator() const; int getDenominator() const; friend void display(ostream& out, const Rational& value); friend bool operator(const Rational& left, const Rational& right); private: int numerator; int denominator; }; what must we add to the class in order for the following code to compile? Rational myRational(2,3); if ( 3 < myRational) a. We need another < operator that expects an integer as the second parameter. b. We need another < operator that expects an integer as the first parameter. c. We need a constructor that expects a ration number d. We need a constructor that expects an integer e. A or D f. B or D

Computer Science & Information Technology

You have a filename with spaces in it. How do you copy it? How do you delete it?

What will be an ideal response?

Computer Science & Information Technology

Match each item with a statement below.

A. Windows 7 uses these to identify computers on a network that are not part of a domain B. Windows software that enables your computer to access shared resources on other Windows computers C. automatic address assignment when no DHCP server is available D. associates users of UNIX systems who have common access needs. E. a subnetwork technology used for SANS and enables gigabit speed data transfers F. special set of permissions that may be associated with executable programs running in UNIX/Linux systems. G. a device with software that manages shared printing on a network. H. enables you to turn one computer on your network into an "Internet server." I. resources are made available through a third-party outsourcer, but are accessible only to users within a specific organization.

Computer Science & Information Technology

____________________ ensure that devices from one vendor will function with those from other vendors.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology