Which of the following is an appropriate antivirus policy?

A) E-mail attachments are always safe to open.
B) It is safe to download files from the Internet.
C) Always use a virus scanner.
D) Believe all “security alerts” that you receive.


C) Always use a virus scanner.

Computer Science & Information Technology

You might also like to view...

Answer the following questions true (T) or false (F)

1. The Adaptor pattern transforms one class into a different class without changing the underlying class. 2. In a quick sort algorithm, a value called a splitting value is an arbitrarily selected value from the array to sort.

Computer Science & Information Technology

Explain three factors related to the design of a microprocessor that can affect the speed at which it processes instructions.

What will be an ideal response?

Computer Science & Information Technology

Which of the following will not change the location of the active cell?

A. drag and drop B. scrolling C. clicking another cell D. clicking a column heading

Computer Science & Information Technology

The purpose of a UPS backup battery is to permit a PC or server to ____.

A. operate indefinitely B. shutdown normally C. withstand a voltage spike D. operate at half power

Computer Science & Information Technology