1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vsevolod [243]
3 years ago
9

Antivirus software uses ________ to search for known viruses.

Computers and Technology
1 answer:
Nookie1986 [14]3 years ago
4 0
<span>Antivirus software uses signature checking to search for known viruses.</span>
You might be interested in
The sum of the deviations of each data value from this measure of central location will always be zero. A. Median B. Standard de
JulijaS [17]

Answer:

C. Mean

Explanation:

Mean = (∑x_{i})/N

Median = central values when data is sorted

Mode = most repeated value

Standard deviation = \sqrt{sum(x_{i}-mean)^{2}/N}

In standard deviation, formula you may see that deviation is being calculated from the mean (central location). But here we take square of the value before adding all of them.

But if we just take sum(x - mean), it would be equal to zero.

<u>EXAMPLE</u>

Take 4, 9, 5 as data

mean = (4+9+5)/3 = 18/3 = 6

sum of deviations from mean = (4-6)+(9-6)+(5-6) = (-2)+(3)+(-1) = 0

8 0
3 years ago
Read 2 more answers
What type of filtering software divides email messages that have been received into two piles, spam and non-spam and then analyz
Hunter-Best [27]

Answer:

Bayesian filtering

Explanation:

This is a type of filtering software that makes use of Bayesian logic to evaluate every incoming email that you receive, analyzing the header and content of the email to determinate if it is spam or not. It uses a preset of common words that are present in most spam emails, and it categorizes all received emails according to their probability to contain spam in trusted, or not trusted email. These categories are usually set by the user.

In short, Bayesian logic uses the knowledge acquired from past events to try to predict future events. Determinate the probability of success (from 0 to 100%) of a certain activity, according to the result of prior tests. It was first suggested in 1763 after the death of its creator Thomas Bayes, and it is widely spread across several different sciences such as programming, artificial intelligence, physics, etc.

6 0
3 years ago
(08.02 LC)<br> It is appropriate to leave sections of an application blank.<br> O True<br> O False
Oksi-84 [34.3K]

Explanation:

it is false because it is not appropriate

5 0
2 years ago
Read 2 more answers
What is the black oval for on the back of an ipod touch for?
Brut [27]

The black strip is wifi antenna for iPod Touch.

5 0
3 years ago
an IPv6 packet has a 40 byte base header, a 20 byte destination options extension header (which is not used for routing) and 200
NISA [10]

Answer:

Explanation:

Given, total payload is: 2000 bytes

 MTU is: 1500 bytes

 Header is: 20 bytes

 Base header is: 40 bytes

Total number of fragments = Total Payload / MTU

                                            = 2500 / 1500

                                            = 2 fragments

Fragment     Base header    Fragmentation header     Authentication  

                                                                                                     header + Data

1                  40 bytes                  8 bytes                              20 bytes +772bytes

2                 40 bytes                   8 bytes                                 792 bytes

7 0
2 years ago
Other questions:
  • Which of the following is an important initial step in designing an interface
    7·1 answer
  • What is word processing?
    15·2 answers
  • PLEASE HELP!!!!! David has gone to the Niagara Falls with his camera. He wants to click photos of the people around him and also
    11·2 answers
  • Which is the correct sequence of steps for opening a new document?
    10·2 answers
  • Name three actions you can perform on an inserted image.
    7·2 answers
  • With a web app, much of the program code for the software runs locally on a computer, instead of running on a remote computer co
    13·1 answer
  • What is your favourite video game??​
    5·2 answers
  • Which key(s) will launch the Spelling Checker dialog box? F8 F7 Ctrl+H F2
    11·2 answers
  • A _____ standard describes the requirements for obtaining a domain name for use by external parties?
    10·1 answer
  • What is the destination ip address when an ipv4 host sends a dhcpdiscover message?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!