Generally, ____ antivirus software compares file sizes (checking for added code when none is expected), looks for replicating instructions, and searches for unusual file activity.
A. diagnostic
B. preventive
C. reactive
D. firewall
Answer: A
Computer Science & Information Technology
You might also like to view...
When users are importing data from an Excel spreadsheet into a new table, they have the option to set their own primary key if there is a field in the source file that is unique for each record
Indicate whether the statement is true or false
Computer Science & Information Technology
One way to create a form in Access, is to use the ________ which can be used to select multiple tables and specific fields for the form
A) control grid B) Input Mask Wizard C) Form Wizard D) Navigation Pane
Computer Science & Information Technology