Which of the following types of virus scanning uses rules to determine if a file is behaving like a virus?
a. Heuristic scanning
b. Active code scanning
c. Instant message scanning
d. Email scanning
ANS: A
Computer Science & Information Technology
You might also like to view...
Name at least one situation in which you would not want to use clustering based on SNN similarity or density.
What will be an ideal response?
Computer Science & Information Technology
On a command line, what is a token? What is an argument and how does it usually affect a command? What is an option and how does it usually affect a command? How can you usually distinguish an argument from an option?
What will be an ideal response?
Computer Science & Information Technology
List three physical considerations that H C I design addresses.
What will be an ideal response?
Computer Science & Information Technology
Which of the following is a CSS selector that will configure the anchor elements within the nav element
a. nav a b. .nav a c. nav anchor d. #nav a
Computer Science & Information Technology