"Scott Cawthon" did that.........
Answer:
computer architecture is a set of rules and methods that describe the functionality, organization, and implementation of computer systems. The architecture of a system refers to its structure in terms of separately specified components of that system and their interrelationships.
Answer:
to rank tasks from most to least important
Explanation:
Prioritize means to choose priority, obviously and priority is the thing is the thing which, among other things, have the biggest importance.
Every day, especially in business, one finds himself swimming in tasks up to his neck. Obviously, not all of them can be successfully finished, or at least not without sacrificing one's personal life or sleep.
Prioritizing, therefore, serves as a helpful organising tool. After writing down all tasks that need to be done, a person should rank them by priority, which means that only urgent and important tasks will be dealt with immediately. Tasks of lower priority will be postponed, delegated or simply deleted.
Answer:
New Formatting Rule.
Explanation:
Using New Formatting Rule the rule can be used in the database .Conditional formatting is used to highlight cells with different color according to the value of the cell. Conditional formatting can be done using formulas.In conditional formatting you can use if statements ,if else staements ,formulas etc.
Answer:
B. Intrusion Detection Software (IDS)
Explanation:
An Intrusion Detection Software (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion.