____ scanning works by recognizing the unique pattern of a virus.?

A. ?Time-based
B. ?Amplitude-based
C. ?Signature-based
D. ?Frequency-based


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following is true?

Let Dog be a subclass of Animal, and suppose Animal has a method called speak() that is overridden in the Dog class. Consider the following code. ``` Animal spot = new Dog(); spot.speak(); ``` a) This code will result in a compile-time error. b) This code will result in a run-time error. c) The speak method defined in the Animal class will be called. d) The speak method defined in the Dog class will be called. e) The speak method will not be called at all.

Computer Science & Information Technology

A(n) _____ is a group of individuals whose members are distributed geographically, but who collaborate and complete work through the use of information systems technology.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The Windows Server 2012/R2 remote management features are enabled via what Windows component?

A. Windows Remote Management (WinRM) B. Windows Management Infrastructure (WMI) C. Windows Management Framework (WMF) D. Windows Remote Administration (WMA)

Computer Science & Information Technology

Explain the problems that the first normal form fixes.

What will be an ideal response?

Computer Science & Information Technology