1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mademuasel [1]
3 years ago
12

Where does an antivirus run suspicious applications?

Computers and Technology
1 answer:
Step2247 [10]3 years ago
7 0

Answer:

Antivirus programs use heuristics, by running susceptible programs or applications with suspicious code on it, within a runtime virtual environment. This keeps the vulnerable code from infecting the real world environment. Behavioural-based detection - This type of detection is used in Intrusion Detection mechanism.

You might be interested in
Untuk memberikan keterangan pada bagian bawah halaman dokumen yg akan diulangi pada setiap halaman dokumen yg digunakan fasilita
lisabon 2012 [21]
Fasilitas yg di gunakan adalah footer
5 0
3 years ago
Read 2 more answers
While driving you encounter an emergency vehicle stopped ahead. Discuss how the move over law applies to this situation and your
SOVA2 [1]

According to the move over law, when an individual encounters an emergency vehicle stopped ahead, the drivers who happen to be travelling in the same direction need to move to the adjacent lane carefully and reduce the speed to avoid any collisions.  

<u>Explanation:</u>

After the law, coming to the responsibilities, the driver should make sure that the emergency vehicle that has stopped has not encountered an accident or untoward pull over due to some technical fault.

The driver should also make sure that the traffic behind their vehicle is moving by law and cooperating with the emergency situation.

6 0
3 years ago
Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m
liberstina [14]

Answer:

A white hat hacker, or ethical hacker, uses penetration testing techniques to test an organization's information technology

Explanation:

3 0
2 years ago
Which account type is require to join the computer to the domain?
yulyashka [42]

Answer:

the computer must have an account in the domain which, like a user account, includes a logon name (sAMAccountName), a password, and a security identifier (SID) that uniquely represent the computer as a security principal in the domain.

Explanation:

-Hailey:

4 0
3 years ago
Top 5 best comedy or action movies.
Cloud [144]
Comedy movies you should watch is
grown ups
spider man into the spider verse
action movies you can do
like a fast and furious movie ?
some cool scary movies are
the strangers
insidious
and the serbian film :)
7 0
3 years ago
Read 2 more answers
Other questions:
  • The main differences between laptops and desktop computers other than size and portability.
    14·1 answer
  • ................njkkjjiooiuuuu
    6·1 answer
  • Trish has bought a new computer that she plans to start working on after a week. Since Trish has not used computers in the past,
    10·1 answer
  • Which pane in PowerPoint contains images of the slides in the order they appear in the presentation
    8·2 answers
  • Complete the getOdds method so it returns a new ArrayList of Integers containing all odd Integers from the parameter ArrayList v
    13·1 answer
  • How to change my age on this app
    10·2 answers
  • Define the term algorithm and describe how programmers use algorithms when designing a program.
    8·1 answer
  • Imagine that you are designing an application where you need to perform the operations Insert, DeleteMaximum, and Delete Minimum
    11·1 answer
  • List three natural defects of wood<br>​
    6·2 answers
  • if a manager identifies numerous data integrity issues, she/he should consider the reports generated from that data as invalid a
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!