If you receive an e-mail attachment, you should use a(n) ____ program to verify that the attachment is virus free.

A. firewall
B. encryption
C. decryption
D. antivirus


Answer: D

Computer Science & Information Technology

You might also like to view...

Symbols are stored in the document's library and are accessible from the ____ panel.

A. Archive B. Symbol C. Library D. Properties

Computer Science & Information Technology

A(n) ________ control is a control whose data source is a field in the table such as the customer name

Fill in the blank(s) with correct word

Computer Science & Information Technology

Suppose a phone book contains 500 pages, and each page can contain up to 500 records. Suppose we want to search for a particular name in the book. Give a worst-case bound on the number of pages that must be looked at to perform a search using each of the following methods:

(i) linear search, as if the book were organized as a heap file, (ii) binary search, using the fact that the book is ordered by names, (iii) with an index for the name of the rst entry on each page.

Computer Science & Information Technology

A binary tree is a tree in which no node can have more than two subtrees.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology