1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mademuasel [1]
3 years ago
12

Where does an antivirus run suspicious applications?

Computers and Technology
1 answer:
Step2247 [10]3 years ago
7 0

Answer:

Antivirus programs use heuristics, by running susceptible programs or applications with suspicious code on it, within a runtime virtual environment. This keeps the vulnerable code from infecting the real world environment. Behavioural-based detection - This type of detection is used in Intrusion Detection mechanism.

You might be interested in
When should you stop where you are, drop to the
Vedmedyk [2.9K]

Answer:

A . if you burn a stump because if u roll over the fire will have a 90% chance of going out

7 0
3 years ago
____ refers to the order in which values are used with operators.
mylen [45]

Answer:

b. Associativity

Explanation:

Associativity specifies the order in which operators are processed vis a vis operands/values in an expression. For example: Consider the expression: a + b + c. Here a + b is evaluated first before adding the result with c as the '+' operator is left associative. The default associativity can also be overridden by the use of parentheses. For example a + (b + c) . In this case b+c will be evaluated first.

5 0
3 years ago
What piece of hardware directs traffic between the connected devices when two LAN's are communicating across the Internet?
luda_lava [24]

Answer:

The correct answer is "Router".

Explanation:

In networking, routers is one of the main hardware which is used to direct the data traffic on a LAN system.

The router also works as an interconnection system for two or more than two networks. Routers mostly work between the internet and computer which directs the data to its right path.

It works between the computer system in a premise to make the networking possible through a LAN by using switches for communication between two or more than two devices in a LAN across the internet.

Hence, the most appropriate answer is the router.

3 0
3 years ago
To create an instance of Big Decimal for 454.45, use ________.
agasfer [191]

Answer:

C.

Explanation:

Based on the Java documentation; when creating an instance of BigDecimal, we can pass a string as a constructor.

System.out.println(new BigDecimal("454.45"));

8 0
4 years ago
What is the difference between RELIABLE and UNRELIABLE sources of<br> income?
andrezito [222]
Reliable income is something you can “rely” on, or income you will always receive.

Unreliable income is something you can’t always rely on because you might not be able to access it forever.
4 0
3 years ago
Read 2 more answers
Other questions:
  • When a user first authenticates with a Kerberos-based server, he/she will receive _________ Group of answer choices a ticket-gra
    10·1 answer
  • An independent frame that holds a program, document, or folder contents in windows 7 is called a ____.
    11·1 answer
  • What type of network does not have centralized control, such as one in a small office or home office?
    5·1 answer
  • What defines a social search?​
    6·1 answer
  • A ___________ lists all possible packet switches and gives a next hop for each.
    12·1 answer
  • Under what category of programs and apps do screen savers and backup programs fall?
    10·1 answer
  • What is the result of giving the which utility the name of a command that resides in a directory that is not in your search path
    10·1 answer
  • A ____ may be composed of a few individual objects or several complex groups of objects.
    9·1 answer
  • A television advertisement claiming that a product is "light-years ahead of its time" does not make sense because (a) it doesn’t
    10·1 answer
  • 3. Output the following:<br>a.<br>21%4​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!