Computer Science (Year 8)

Cybersecurity

Which of the following is a common method of protecting computers from viruses?