Which of the following is an appropriate antivirus policy?
A) E-mail attachments are always safe to open.
B) It is safe to download files from the Internet.
C) Always use a virus scanner.
D) Believe all “security alerts” that you receive.
C) Always use a virus scanner.
You might also like to view...
Answer the following questions true (T) or false (F)
1. The Adaptor pattern transforms one class into a different class without changing the underlying class. 2. In a quick sort algorithm, a value called a splitting value is an arbitrarily selected value from the array to sort.
Explain three factors related to the design of a microprocessor that can affect the speed at which it processes instructions.
What will be an ideal response?
Which of the following will not change the location of the active cell?
A. drag and drop B. scrolling C. clicking another cell D. clicking a column heading
The purpose of a UPS backup battery is to permit a PC or server to ____.
A. operate indefinitely B. shutdown normally C. withstand a voltage spike D. operate at half power