Answer:
The correct answer to the following question will be Option A (Open source software).
Explanation:
It's a type of software which is open to all we can download that software by the free of cost. Wamp, Apache server is one of the example of the open source software.
Any software accessible for alteration which is circulated because of its source code is known as Open source software. Open source permissions influence the way technology is used, researched, updated, and circulated by individuals. In fact, it give permission to code users for using this software for whatever use might desire.
Which ensures it includes a developer authorization to modify the script in any manner they want to:
- Developers will patch glitches.
- Change features.
- Modify the app to suit their needs.
No other software available for the alteration is available in the option. So, the proper answer is Option A.
Answer:
File manager
Explanation:
From the list of options 1 to 4, only option (2) is correct
Explaining the options one after the other
- Web browser: It lets users access the internet
- File Manager: Used to create and manage files/folders
- User Interface: Means which the user of a computer interacts with the computer
- File Reader: Used to read the content of a file. e.g. Adobe reader for pdf files, Notepad for text files, etc.
Having explained the options one after the other, <em>the file manager </em>is the answer to this question.
Answer:
B. Intrusion Detection Software (IDS)
Explanation:
An Intrusion Detection Software (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion.