Anti-malware programs can operate as ____________________ that passively monitor a computer's activity, checking for viruses only when certain events occur, such as a program executing or a file being downloaded.
Fill in the blank(s) with the appropriate word(s).
virus shields
Computer Science & Information Technology
You might also like to view...
Visual Basic provides the ____ method for accessing any number of characters contained in a string.
A. Portion B. PartialString C. Substring D. PieceString
Computer Science & Information Technology
The third line of a header in multiple page letters and memos contain the ____________________ .
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
To make your search phrase unique and specific, use _______ .
A. keywords B. the # symbol C. the * symbol D. hits
Computer Science & Information Technology
?The _________ audio element attribute specifies whether and how the audio should be loaded when the page loads.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology