Answer: Operating system
Explanation:
The operating system is the type of software that are responsible for manage the processor time and also the memory allocation in the system. The operating system mainly deals with the processor time by scheduling the processor work done in the system.
The OS mainly control the system and then schedule the execution of various types of function by the central processing system (CPU). It also control the memory allocation in the system.
The item that you would most likely to keep in a database is a Payroll record. Payroll records are numbers and inputs/outputs of employees of a certain company. Numbers are easier to manipulate and easier to manage than statements, letters and addresses that are basically letters.
The options are available for storing backups, physically are:
- In both on site and off site,, a person can backup data to a given system that is located on-site, or the backups can be sent to any remote system that is off-site.
<h3>What is a backup?</h3>
This is known to be a device that helps to save information or data temporarily or permanently.
Note that in the above, The options are available for storing backups, physically are:
- In both on site and off site,, a person can backup data to a given system that is located on-site, or the backups can be sent to any remote system that is off-site.
Learn more about backups from
brainly.com/question/17355457
#SPJ12
True anything is available online.
Is an example of reactive, signature based IDS/IPS
Reactive, signature based IDPS technology is one of the many methodologies used to detect attacks. In a signature based IDS, a misuse detection identifies intrusions by watching for patterns of traffic and compare them against observed events or a database of signatures from known threats. Reactive IDS/IPS, on the other hand, will not only detect and alert malicious traffic but also take pre-defined proactive actions. Using MRTG, Ntop, and SNMPC in routers will monitor traffic and help network managers easily see issues like DOS attacks and security problems.