1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sati [7]
3 years ago
13

Describe at least three virus scanning techniques

Computers and Technology
1 answer:
Natasha_Volkova [10]3 years ago
4 0

Answer:

 Virus scanning technique is the process to scan the software and identify the various viruses in the computing device. The basic aim of virus scanning technique is to provide the information security and review virus in the given program.

The three virus scanning techniques are as follow:

Behavior detection: This type of detection observe the execution of the program and helps in modifying the host file in the system.

Signature based detection: This type of detection uses various type of key aspects for examine the file for creating the fingerprint. It basically represent the byte stream in the file.

Heuristics detection: The basic aim is to detect or examine the files and it is basically designed to improve the security system. It is also known as heur.

You might be interested in
2.Explain the differences between kernel applications of the OS and the applications installed by an organization or user.
Artist 52 [7]

Explanation:

Operating system is a system software, whereas,  Kernel is a part of operating system. Operating system acts as an interface between user and hardware. Kernel acts as an interface between applications and hardware. In Linux, for example, device drivers are often part of a kernel (specifically Loadable Kernel Modules).

6 0
3 years ago
The functions of forums
coldgirl [10]

Answer:

The purpose of the forum is to talk about features that are currently in the game, whether they’re working, whether they’re not working, what we enjoy or dislike, what we would like to see in future, and what we would like to see less of, sharing tips and advice, and sharing creative stuff in the player content section.

Explanation:

Alliance wars is currently in beta testing. Anyone enrolled in the testing has their own access to a separate forum for discussion to discuss amongst themselves, and to provide feedback to the devs, on what is working and what isn’t. None of that information needs to be shared outside of the beta forum. Anyone NOT enrolled in the testing has no idea what is going on with it, so has no reason to be involved with discussing that side of things. If you don’t like that, you had your chance to apply the same as they did.

So yes, that thread should have been removed.

8 0
3 years ago
Write the corresponding Python assignment statements:
Alenkinab [10]

a)

length = 10

breadth = 20

b)

sum = 15

c)

fullname = "{} {} {}".format(first, middle, last)

8 0
3 years ago
List 5 different programming languages calls to print
Irina18 [472]
Print
echo
<p></p>
put
These call prints
5 0
4 years ago
Read 2 more answers
Design and implement an application that reads an integer value representing a year from the user. The purpose of the program is
olga55 [171]

Answer :

Written in java

import java.util.Scanner;

public class Main{

   public static void main(String[] args) {

       int year;

       Scanner scanner = new Scanner(System.in);

       System.out.print("Please enter a year\n\n");

       year = scanner.nextInt();

       while (year < 1582) {

           System.out.print("\nPlease enter a different year above 1582\n");

           year = scanner.nextInt();

       }

       if (year % 4 == 0) {

           if(year % 100 ==0 && year % 400 != 0){

                   System.out.println(year + " is not a leap year\n\n");

           }else {

               System.out.println(year + " is a leap year\n");

           }

       } else {

           System.out.println(year + " is not a leap year\n\n");

       }

   }

}

4 0
3 years ago
Other questions:
  • What is the device called which typically combines the capabilities of a scanner, printer, fax, and copying machine?
    15·1 answer
  • True or False? In cloud computing, the term "Measured service" refers to a billing model in which gaining access to resources do
    12·1 answer
  • In which of these scenarios would the top 10 option be most helpful
    10·1 answer
  • Optimization Score is made up of over 50 recommendations to optimize Search campaigns.A. TrueB. False
    11·1 answer
  • Your task is to improve a multi-threaded program that frequently writes small entries to a shared file by introducing a layer th
    7·1 answer
  • How do i do to use the cumputer very wel?
    14·2 answers
  • What is word length in computer​
    10·2 answers
  • Which of the following is not an example of a cyber crime?
    8·1 answer
  • 8. Software ____ are individual programs that can be purchased, installed, and run separately, but extract data from the common
    12·1 answer
  • I don't want my large video files using up all my hard drive space . can i archive my videos in on dvds or blu rays?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!