Some anti-virus software is memory resident and loaded on start up. It then actively monitors systems and programs that are ran, for infections. Such examples include boot files, discs and files which are accessed during start-up
Category Archives: FAQ
FAQ: Description of anti-virus software detection techniques: heuristic detection
Some more sophisticated antivirus software uses heuristic analysis to identify new malware or variants of known malware.
Many viruses start as a single infection and through either mutation or refinements by other attackers, can grow into dozens of slightly different strains, called variants. Generic detection refers to the detection and removal of multiple threats using a single virus definition
FAQ – • Explanation and exemplification of the terms ‘codec’ and ‘container’ file
Explanation and exemplification of the terms ‘codec’ and ‘container’ file
Continue reading FAQ – • Explanation and exemplification of the terms ‘codec’ and ‘container’ file
FAQ – Description of methodologies used in the creation or definition of a multimedia application
Description of methodologies used in the creation or definition of a multimedia application, including:
o WYSIWYG editors and text editors to create web pages
o authoring software to create multimedia applications
o presentation software to create presentations
FAQ – Description of the software development process as it applies to the development of multimedia applications
Description of the software development process as it applies to the development of multimedia applications
DIM
DIM is used to dimensionalise a variable, that is set memory aside for the variable to be stored. It is used thus
- DIM Number1 as Integer
- DIM Number2 as Integer
However this can be shortened to
- DIM Number1, Number2 as Integer
In this case VB(Express Edition) sets number1 & number2 to integers. A more complex example can be seen below
- DIM StrName as String
- DIM Number1, Number2 as Integer
Becomes
- DIM StrName as String, Number1, Number2 as Integer
You need to be careful that you get your syntax correct. It might be easier at the start to stick with the traditional(top) method.
FAQ – Description of the application of the following to the misuse of networks
Description of the application of the following to the misuse of networks
- the Computer Misuse Act
- the Copy right Designs and Patents Act
- the Data Protection Act
Continue reading FAQ – Description of the application of the following to the misuse of networks
FAQ – Types of maintenance
Description and exemplification of corrective, adaptive and perfective maintenance
FAQ – Real or Virtual 3D
display technologies
- including real and virtual 3D displays
FAQ – Fetch Execute Cycle
Simple description, referring to the appropriate buses and control lines, of the steps in the fetch-execute cycle