1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ehidna [41]
4 years ago
15

Rene has purchased new antivirus software. This software has an added feature, where it can execute suspicious files in a virtua

l environment. If the file is safe, the software will permit Rene to execute the program in real time. Which detection method does Rene’s software employ?

Computers and Technology
1 answer:
kupik [55]4 years ago
6 0

Answer:

b) Signature detection

Explanation:

Signature detection is a process where a unique identifier is established about a known threat so that the threat can be identified in the future. In the case of a virus attack, it may be a unique pattern of code that attaches to a file, or it may be as simple as the hash of a known bad file.

If my answer helped, kindly mark me as the brainliest!!

Thank You!!

You might be interested in
IN C++ PLEASE!!! Read integers from input and store each integer into a vector until -1 is read. Do not store -1 into the vector
ololo11 [35]
#include
#include
using namespace std;

int main(){

int input[] = {-19, 34, -54, 65, -1};
std::vector voutput:
std::vector vinput (input, input + sizeof(input) / sizeof(int) );

for (std::vector::iterator it = vinput.begin(); it != vinput.end(); ++it)
if(*it > 0) voutput.insert(voutput.begin(), *it);
for(std::vector::iterator it = voutput.begin(); it < voutput.end(); ++it)
std::cout << *it << ‘\n’ ;

return 0;
}
6 0
3 years ago
The technical relationship between inputs and outputs, which is needed to understand the difference between the short run and th
MrRa [10]
<span>The technical relationship between inputs and outputs, which is needed to understand the difference between the short run and the long run, is called a production function.

Hope I helped ;)
</span>
3 0
3 years ago
You are working as a Software Programmer for one of the big retail company. You need to implement the program that can store at
Aleks [24]

Answer:

The C++ code is given below with appropriate comments. Random names of customer information are chosen as samples

Explanation:

#include <iostream>

using namespace std;

int main()

{

// Initialize String Arrays for customerName,customerAddress1,city,state,zip for 15 customers

string customerName[15] = {"Liam","Noah","William","James","Logan","Benj","Mason","Elijah","John","Patty","Cheryl","Nick","Brian","Steve","mark"};

string customerAddress1[15] = {"Liam - Address1","Noah - Address2","William - Address3","James - Address4","Logan - Address5","Benjamin - Address6","Mason - Address7","Elijah - Address8","John - Address9","Patty - Address10","Cheryl - Address11","Nick - Address12","Brian - Address13","Steve - Address14","mark - Address15"};

string city[15] = {"Sitka","Juneau","Wrangell","Anchorage","Jacksonville","Anaconda","Oklahoma City","Fort Worth","Dallas","Sitka","Juneau","Wrangell","Anchorage","Jacksonville","Anaconda"};

string state[15] = {"Alaska","Alaska","Alaska","Alaska","Florida","Montana","Montana","Oklahoma","Texas","Arizona","Tennessee","California","Virginia","Indiana","Virginia"};

int zip[15] = {30041,36602,75062,78952,12071,55874,11236,44512,55262,99874,11020,55820,11304,11587,11047};

// Print Zips for the customers

cout <<"Customer Names"<<"\t"<< "Zip Code"<< "\n";

for (int i = 0; i < 15; i++)

cout <<customerName[i]<<"\t\t\t"<< zip[i] << "\n";

}

5 0
3 years ago
What mode is generally used when delivering a presentation to an audience?
dybincka [34]

Answer:

delivery mode

Explanation:

there it is

7 0
3 years ago
Read 2 more answers
When initiating a connection how does tcp establish a connection?
Pani-rosa [81]
It uses a 3-way handshake

1. SYN from client to server.
2. SYN-ACK from server to client.
3. ACK from client to the server.

At this point, both client and server have received an acknowledgement of the connection.

4 0
3 years ago
Other questions:
  • Monetary Policy can be either Expansionary or Contractionary. Which of the following actions classify as Expansionary Monetary P
    7·2 answers
  • ___ is the amount of data that a storage device can move from the storage medium to the computer per second.
    11·1 answer
  • when you assign a(n) ___ to a field, Access will display the value you assign, rather than the field name, in datasheets and in
    15·1 answer
  • Who designed analatic engine in the 1930's?​
    10·1 answer
  • Piers lives in an apartment and has an existing home television connection. He wants to subscribe to a high-speed internet conne
    13·1 answer
  • ????????????????????????????????
    5·1 answer
  • how do i create a program in little man computer that takes 2 numbers, divides them and then outputs the div and mod?
    8·1 answer
  • High speed printer that produce higher quality printouts but are more expensive is
    15·1 answer
  • What standards organization maintains the ethernet standard?.
    12·1 answer
  • State two differences between a mouse pointer and a mouse cursor​
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!