1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olganol [36]
2 years ago
9

Which choice is not a form of antivirus scanning that compares known virus patterns to scanned files

Computers and Technology
1 answer:
Ira Lisetskai [31]2 years ago
8 0

The choice that is not a form of antivirus scanning that compares known virus patterns to scanned files is called; Heuristic scanning

<h3>Antivirus Detection</h3>

The correct answer is Heuristic Scanning from the options seen online. This is because Heuristic scanning is a method utilized by many computer antivirus programs to detect previously unknown computer viruses, as well as new variants.

Thus, heuristic scanning doesn't compare known virus patterns to scanned files.

Read more about antivirus detection at; brainly.com/question/17209742

You might be interested in
A(n) ___________________ is a set of characters that the originator of the data uses to encrypt the text and the recipient of th
Sindrei [870]

Answer:

The appropriate response will be "Public key".

Explanation:

  • A public key would be created in something like such key encryption cryptography consisting incorporates asymmetric encryption of the keys algorithms.
  • Those same keys have been utilized to transform a document to even such an unintelligible form. Decryption consists done using only a separate, however corresponding, secret address or private key.
6 0
3 years ago
What is computer-aided design/computer-aided manufacturing (CAD/CAM)? a.A cultural trend that places value on an individual's ab
masha68 [24]

Answer:

C. RFID tag Systems are used to create the digital designs and then manufacture the products

7 0
3 years ago
A(n) ____ is a front-end processor that multiplexes the traffic from hundreds of remote terminals into one port on a large compu
Taya2010 [7]
I think it'd be terminal concentrator.  A(n) terminal concentrator is a front - end processor that multiplexes the traffic from hundreds of remote terminals into one port on a large computer. 
7 0
3 years ago
A developer of a relational database refers to a file as a
goldenfox [79]
This is the correct Answer    <span>Attribute</span>
5 0
3 years ago
You are considering upgrading from Office 2010 to Office 2013. Which of the following is NOT true of either Office 2010 or Offic
Dmitry [639]

office 2013 can intergrute directly with the cloud

5 0
3 years ago
Other questions:
  • 4. When determining the tone of their tweets, marketers should consider
    8·1 answer
  • If I add a # symbol in front of the cells row/column, it will keep the value true.
    14·1 answer
  • An internal _____ refers to a specific representation of an internal model, using the database constructs supported by the chose
    8·1 answer
  • The following slide was created as part of a presentation that trains new employees how to use the scheduling and calendar softw
    14·2 answers
  • Brad is joining a big website design firm. He is worried that he may not be able to adapt to the company culture. What can he do
    15·1 answer
  • News writers get story leads from____.
    8·1 answer
  • What does ADAC mean <br> pls answer quickly i will mrk brainliest
    14·2 answers
  • Please help me asapppp!​
    8·2 answers
  • Data elements in a relational database are organized into ____
    15·1 answer
  • How to find HCF and LCM of a number in Q Basic program?? ​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!