If you receive an e-mail attachment, you should use a(n) ____ program to verify that the attachment is virus free.
A. firewall
B. encryption
C. decryption
D. antivirus
Answer: D
You might also like to view...
Symbols are stored in the document's library and are accessible from the ____ panel.
A. Archive B. Symbol C. Library D. Properties
A(n) ________ control is a control whose data source is a field in the table such as the customer name
Fill in the blank(s) with correct word
Suppose a phone book contains 500 pages, and each page can contain up to 500 records. Suppose we want to search for a particular name in the book. Give a worst-case bound on the number of pages that must be looked at to perform a search using each of the following methods:
(i) linear search, as if the book were organized as a heap file, (ii) binary search, using the fact that the book is ordered by names, (iii) with an index for the name of the rst entry on each page.
A binary tree is a tree in which no node can have more than two subtrees.
Answer the following statement true (T) or false (F)