The process of eradicating a virus, sometimes called _____, might include deleting the virus code from files or deleting infected files.
A. erasing
B. disinfecting
C. exterminating
D. cleaning
Answer: B
You might also like to view...
Use sort with the ––numeric-sort (–n) option to create a file named calo that holds the lines of the food file ordered by calories with the food with the most calories at the top of the list.
What will be an ideal response?
What is the most secure option for the type of passcode that can be entered to access a mobile device?
A. strong alphanumeric password B. short PIN C. swipe pattern D. user name
The program instructions resulting from coding an algorithm are referred to as pseudocode.
Answer the following statement true (T) or false (F)
__________ are important in compilers and operating systems—insertions and deletions are made only at one end of a __________—its top.
a) Linked lists, linked list b) Queues, queue c) Stacks, stack d) Binary trees, binary tree