1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mademuasel [1]
3 years ago
12

Where does an antivirus run suspicious applications?

Computers and Technology
1 answer:
Step2247 [10]3 years ago
7 0

Answer:

Antivirus programs use heuristics, by running susceptible programs or applications with suspicious code on it, within a runtime virtual environment. This keeps the vulnerable code from infecting the real world environment. Behavioural-based detection - This type of detection is used in Intrusion Detection mechanism.

You might be interested in
Describe two measures you can use to evaluate whether an attachment in a message is reliable to open.
meriva
<span>If a attachment is not reliable to open, terrible effects can happen, peradventure it may have a virus or even malware that can destroy a computers software. 

To avoid this and stay on the safe side, try the following:-

- Open it in protected view 
- Do not save the attachment on your computer 
- Look at the author and read the message carefully to make sure it is not biased. 
- Open it on a flash-drive </span>
8 0
3 years ago
Read 2 more answers
A major hospital uses an agile approach to manage surgery schedules. a large board set up in a common office allows staff to qui
Radda [10]

In this scenario, the Agile approach (method) that is being used and described is referred to as Kanban.

<h3>What is SDLC?</h3>

SDLC is an abbreviation for software development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality software programs.

<h3>What is Agile software development?</h3>

In Agile software development, the software development team are more focused on producing efficiently and effectively working software programs with less effort on documentation.

In this scenario, we can infer and logically deduce that the Agile approach (method) that is being used and described is referred to as Kanban because it necessitates and facilitates real-time capacity communication among staffs, as well as complete work openness.

Read more on software development here: brainly.com/question/26324021

#SPJ1

Complete Question:

A major hospital uses an Agile approach to manage surgery schedules. A large board set up in a common office allows staff to quickly identify which procedures are scheduled, the times they are scheduled, and who is involved. Which method is described in this scenario?

A. Journey

B. Mapping

C. Waterfall

D. Kanban

E. Sprint

F. I don't know this ye

7 0
1 year ago
Travis sends Suri what purports to be a link to an e-birthday card, but when she clicks on the link, software is downloaded to h
12345 [234]

Answer:

Identity Theft

Explanation:

Identity theft is the act of someone who obtains details about someone else illegally.  This is done to find personal and financial information such  name, address,social security number, passwords, and credit card number, phone number, e-mail, etc. Then the hacker can use this information to control bank accounts, e-mails, computers, portray himself as you are, or sell information to someone else.

3 0
3 years ago
Who are the best candidates for members of skills USA?
Kryger [21]

Answer:

Is there more to the question? But I have had this question already and the answer is B)

7 0
3 years ago
Write a program that asks the user for a CSV of the NYC Open Data Film Permits: There is a sample file for June 2019 film permit
Westkost [7]

Answer:

Before running this program, make sure you have installed pandas module for python.

pip install pandas

import pandas as pd

import numpy as np

csv_file = input("Enter CSV File Name : ")

df = pd.read_csv(csv_file)

count_row = df.shape[0]

print("There were %d Film Permits in Total." %(count_row))

borough_count = df['Borough'].value_counts()

print(borough_count)

location_count = df['ParkingHeld'].value_counts().head(5)

print(location_count)

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • Dfd symbols are referenced by using all ____ letters for the symbol name.
    9·1 answer
  • A power supply unit for a computer converts:
    7·1 answer
  • Which of the following lists contains the five essential elements of a computer? Group of answer choices: 1. inputs, returns, pr
    11·1 answer
  • I need help, please and thank you.
    7·2 answers
  • The internet shopping cart is an example of which version of the web?
    11·1 answer
  • And Python code for the following programming problem and the pseudo code below
    5·1 answer
  • The cameras picture review function allows you to look at the _ you've taken
    8·1 answer
  • A gui allows you to interact with objects on the screen such as icons and buttons true or false
    7·1 answer
  • Jennifer has written a short story for children. What should be her last step before she submits the story for publication?
    6·1 answer
  • The ______________<br> holds data only while the computer is on.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!