1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sati [7]
3 years ago
13

Describe at least three virus scanning techniques

Computers and Technology
1 answer:
Natasha_Volkova [10]3 years ago
4 0

Answer:

 Virus scanning technique is the process to scan the software and identify the various viruses in the computing device. The basic aim of virus scanning technique is to provide the information security and review virus in the given program.

The three virus scanning techniques are as follow:

Behavior detection: This type of detection observe the execution of the program and helps in modifying the host file in the system.

Signature based detection: This type of detection uses various type of key aspects for examine the file for creating the fingerprint. It basically represent the byte stream in the file.

Heuristics detection: The basic aim is to detect or examine the files and it is basically designed to improve the security system. It is also known as heur.

You might be interested in
Which of the following decimal (base-10) values is equivalent to the binary (base-2) value 101001?
garik1379 [7]

Answer:

D. 41

Explanation:

101001 is in base 2.

To convert 101001 to base 10;

1*2^5+0*2^4+1*2^3+0*2^2+0*2^1+1*2^0

1*32+0*16+1*8+0*4+0*2+1*1

32+0+8+0+0+1

=41

8 0
3 years ago
Which phrase is the best definition of sparklines in Excel 2016?
ddd [48]

Answer:

Option 2: a type of mini chart that users can insert into a worksheet

Explanation:

A graph or chart is used to show trends and changes in a dataset.

When we have to show trends or changes in MS Excel, there are a lot of options available. One of them is Sparklines. Sparklines are like mini charts that can be used to show data graphically.

Hence,

The correct answer is:

Option 2: a type of mini chart that users can insert into a worksheet

5 0
2 years ago
Read 2 more answers
Which of these are examples of a bug?
nadya68 [22]
The answer is b and c
7 0
3 years ago
What is the answer to this?
Anit [1.1K]

Answer: I think the Valorous Unit Ribbon

Explanation: I don't really understand what's it asking but I sort of did to get this answer!

5 0
3 years ago
A network administrator is reviewing a network design that uses a fixed configuration enterprise router that supports both LAN a
tester [92]

Answer:

a modular router

Explanation:

A modular router is a type of router that will provide multiple slots, this will enable the network engineer to either change or increase the number of space the router has.

A layer 3 switch cannot provide a WAN connectivity even though it can increase the number of ports on a router. The concept of PoE capability of any device have nothing to do with the number of ports it has. If the Engineer decides to use another fixed configuration router it will still lead to the same problem in the future because it cannot guarantee or provide the flexibility of future growth adaptation which can be given by a modular router if put in use.

8 0
3 years ago
Other questions:
  • Read the PIC Data sheet Chapter 2.0 and 3.0 2. List at least 3 big differences between the Flash and RAM 3. How many RAM locatio
    5·1 answer
  • Utility software is also known as _____​
    11·1 answer
  • List 3 items that were on kens resume that should have been excluded
    13·2 answers
  • Tweaking existing technology in a new way is usually called _____. leveraged creativity state-of-the-art breakthrough applicatio
    5·1 answer
  • Which category does this fall in identity theft​
    6·1 answer
  • Creating Classes
    10·1 answer
  • A variable is assigned a value on line 328 of a program. Which of the following must be true in order for the variable to work?
    12·2 answers
  • Most of the energy we use originally came from:
    8·1 answer
  • Which Windows registry hive stores information about object linking and embedding (OLE) registrations
    11·1 answer
  • When an EC2 instance is being modified to have more RAM, is this considered Scaling Up or Scaling Out?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!