Anti-malware programs can operate as ____________________ that passively monitor a computer's activity, checking for viruses only when certain events occur, such as a program executing or a file being downloaded.

Fill in the blank(s) with the appropriate word(s).


virus shields

Computer Science & Information Technology

You might also like to view...

Visual Basic provides the ____ method for accessing any number of characters contained in a string.

A. Portion B. PartialString C. Substring D. PieceString

Computer Science & Information Technology

The third line of a header in multiple page letters and memos contain the  ____________________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

To make your search phrase unique and specific, use _______ .

A. keywords B. the # symbol C. the * symbol D. hits

Computer Science & Information Technology

?The _________ audio element attribute specifies whether and how the audio should be loaded when the page loads.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology