Generally, ____ antivirus software compares file sizes (checking for added code when none is expected), looks for replicating instructions, and searches for unusual file activity.

A. diagnostic
B. preventive
C. reactive
D. firewall

Answer: A

Computer Science & Information Technology

You might also like to view...

When users are importing data from an Excel spreadsheet into a new table, they have the option to set their own primary key if there is a field in the source file that is unique for each record

Indicate whether the statement is true or false

Computer Science & Information Technology

One way to create a form in Access, is to use the ________ which can be used to select multiple tables and specific fields for the form

A) control grid B) Input Mask Wizard C) Form Wizard D) Navigation Pane

Computer Science & Information Technology