1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sati [7]
3 years ago
13

Describe at least three virus scanning techniques

Computers and Technology
1 answer:
Natasha_Volkova [10]3 years ago
4 0

Answer:

 Virus scanning technique is the process to scan the software and identify the various viruses in the computing device. The basic aim of virus scanning technique is to provide the information security and review virus in the given program.

The three virus scanning techniques are as follow:

Behavior detection: This type of detection observe the execution of the program and helps in modifying the host file in the system.

Signature based detection: This type of detection uses various type of key aspects for examine the file for creating the fingerprint. It basically represent the byte stream in the file.

Heuristics detection: The basic aim is to detect or examine the files and it is basically designed to improve the security system. It is also known as heur.

You might be interested in
Which occupation requires certification by the state?
VARVARA [1.3K]
Interpreting I know of at least sign language the state is requiring you to be certified in order to have that occupation.
3 0
3 years ago
Read 2 more answers
What is the purpose of the print area feature​
Otrada [13]

Answer: The Print Area function in Excel allows you to print part of a spreadsheet rather than the full sheet

Explanation:

3 0
3 years ago
Print ___________ command is used for adding numbers.​
quester [9]

Answer:

phyton is the answer....

5 0
2 years ago
If no other row matches, the router will select the ________ row as its best match. First Last either First or Last, depending o
zzz [600]

Answer:

Last

Explanation:

Routing is a term in engineering which involves the process of selecting a path for traffic in a network or across multiple networks. It is applicable in circuit-switched networks, such as the public switched telephone network (PSTN), and computer networks, such as the Internet. It is mostly used as a term for IP Routing.

Hence, in IP Routing, the first step is comparing the packet's destination IP address to all rows, followed by selecting the nest-match row. However, If no other row matches, the router will select the LAST row as its best match.

6 0
3 years ago
Question 2 (2 points)
swat32

I beleive all of the above for question one

4 0
2 years ago
Other questions:
  • Explain computer software in detail with the help of proper examples
    8·1 answer
  • Taking away iPad privileges when a student hits another child would be considered a(an) ________ principle for decreasing or ext
    10·1 answer
  • Assign jsonData with the parsed value of the stringData variable. Then, assign 29 to the points property in jsonData and assign
    13·1 answer
  • The marketplace is the essence of which of the following?
    11·1 answer
  • Write a program that reads raw data from a file that contains an inventory of items. The items should be sorted by name, and the
    12·1 answer
  • What’s an example of software?
    6·2 answers
  • What makes these Pokémon special?
    9·2 answers
  • Which are aspects of the post-production stage?
    9·1 answer
  • Which of the listed tools would a barber likely use in the following scenario?
    15·1 answer
  • NEED ANS ASAP THANK YOU
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!