1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melamori03 [73]
1 year ago
7

software that opens files and scans their code to look for certain types of malware is known as software.

Computers and Technology
1 answer:
9966 [12]1 year ago
8 0

Software that opens files and scans their code to look for certain types of malware is known as antivirus software.

An antivirus software is designed specifically to scan, detect and eliminate various kinds of malicious software from computers and laptops. Malicious software, short from is malware, is a broad term encapsulating any kind of intrusive software that can damage and destroy computer systems, networks and servers.

To get rid of the damage produced by malware attacks, antivirus comes into action and provides real-time protection. Once an antivirus has been installed, it starts working in the background. It regularly scans computer systems and servers against malware threats in order to block and delete malware codes or files.

Some variants of malware include viruses, Trojan horses, worms, spyware, ransomware, adware, scareware, rogue software, and wiper.

Therefore, antivirus is the software that opens the files and scans their code against various malware.

You can learn more about antivirus at

brainly.com/question/17209742

#SPJ4

You might be interested in
You friends parents are worried about going over their budget for the month. Which expense would you suggest is NOT a need?
Lapatulllka [165]

Answer:

Anything that doesn't have to do with food (including water), shelter, or clothing.

For Example: Going to the pool is not a need, going on vacation is not a need etc. etc.

Hope this helps

Explanation:

8 0
3 years ago
Pat is listing the parts of a computer. Which is the best option to use when formatting the list?
Zina [86]
If you mean a web page ten the bet option would be elements, where gives you an unordered list and give you an order list
5 0
3 years ago
Explain how you would assess the operating system requirements for virtualization if the organization wanted to virtualize 25% o
insens350 [35]

Answer:

The requirement of the virtualization in the operating system:

• The virtualization of the resources from single systems input can be partitioned into a small virtual environment in multiple system data processes.

• Virtualization can collect the physical system's hardware and software data, they can transfer the virtualization process and also verify that the working system is running properly.

• Virtualization has to determine the specific components such as workload, file location, network traffic and console administration process. The requirement for moving into the virtual environment must be selected based on windows for the operating system(32-bit), windows host operating system(4-bit) and Linux operating system.

7 0
4 years ago
how can cindy collaborate with mallory in order for cindy to be able to decrypt all subsequent encrypted messages that are sent
Olenka [21]

Cryptography, like digital signatures, is used to accomplish nonrepudiation, which also includes services for authentication, auditing, and logging.

Digital signatures in online transactions make assurance that a party cannot later dispute the sending of information or the validity of its signature. Alice can encrypt the communication using her own Private Key. As a result, only her public key, which she is aware Bob (and everyone else) has access to, may be used to decrypt her message. Bob receives the message, and he uses Alice's public key to decrypt it. Secret key cryptography (symmetric encryption): To encrypt and decrypt given messages, both the sender and the receiver must use the same key.

Learn more about information here-

brainly.com/question/15709585

#SPJ4

6 0
1 year ago
Can you shorten this using Java Assignments (-=, +=, *=, etc.)?<br> “ second = first - second; ”
stepladder [879]

Answer:

YES YOU CAN sorry caps

Explanation:

5 0
3 years ago
Other questions:
  • Robin maintains a web page for updating the metro timings in the city. He would like the website to display the present day's sc
    6·1 answer
  • If you implement a Wireless LAN (WLAN) to support connectivity for laptops in the Workstation Domain, which domain does WLAN fal
    5·1 answer
  • What are some good websites i can use to test my knowledge?
    11·2 answers
  • Select the correct answer from each drop-down menu.
    8·1 answer
  • You have a small company and want to keep your costs low, but it is important your employees share data. Which network would pro
    5·2 answers
  • Given an char variable last that has been initialized to a lowercase letter, write a loop that displays all possible combination
    8·1 answer
  • Which of the following is constantly changing and advancing?
    11·1 answer
  • If I write too much for an exam answer, do I get downgraded?
    7·1 answer
  • Using range(1,101), make two list, one containing all even numbers and other containing all odd numbers. How can I do this on Py
    15·1 answer
  • What would the internet be like today if there was no World Wide Web?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!