Answer:
b
Explanation:
CPU manual provides guides to use a CPU.
Assembler manual provides guide on how to use an assembler and so is the case for compiler.
For a particular machine, it set of instructinos are available with the programmer.
Answer:
B. Intrusion Detection Software (IDS)
Explanation:
An Intrusion Detection Software (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion.
Answer:
ipconfig
Explanation:
ipconfig (short for <em>internet protocol configuration</em>) is a command line tool used for determining the network connection configuration of a computer. Some of these configuration information are;
i. the IP address of the computer
ii. default gateway address
iii. subnet mask
iv. Media Access Control (MAC) address.
Answer:
incremental
Explanation:
An incremental backup backs up only the files on a computer that have changed since the last time a backup was performed.
Well the only one that is actually a piece of programming is A. Word Processing Program. B, C and D are all peripherals for a computer not actual software for it. Basically if you have to install it on the computer its software. Now B C and D may need software to make them compatible with your computer they themselves dont need to be installed.