Answer:
Time machine.
Explanation:
An OS X backup utility that automatically backs up files to a dedicated drive that is always available when the computer is turned on is called a time machine.
OS X was released in 2001 and it's Apple's version ten (10) of the operating system that runs on its Macintosh computers.
A time machine is a software tool built into the Mac operating system and it is primarily designed to automatically backup user files or data onto a dedicated drive such as an external hard drive disk through a wired connection, by using a Thunderbolt or universal serial bus (USB) cable. The automatic backup can as well be done wirelessly through a network connection.
Answer: Database middleware
Explanation:
Database connectivity is the technique by which application programs makes the interaction and transfer of data storage . The connectivity of the database of the software is called database middleware, as it acts as a piece of software that makes connection as a middle-factor between the application program and the collection of data.
Therefore, database connectivity is also called as database middleware.
Answer:
The storage area network basically apply in the networking model for storage various application in the data center. The storage area network (SAN) provide the common pathway between the server and the storage device.
The storage area network technology basically implemented in the fiber channel configuration over the ethernet. SAN provide access to the data that shared by the personal resources. It is basically simple and dedicated network which provide for the data storage.
A documment is a server with the original copy of the data that others need.
Answer: C)report the status of individual computer users
Explanation:Morris worm is known as the program that replicates itself automatically and hides in the computer system.Because of the vulnerability of the system ,the worm worked as finger protocol for the gaining of the user information and status.
Other option are incorrect as the they are not the vulnerability factor for the Morris worm to work on it and thus finger protocols don't work on those option.Thus, the correct answer is option(c)