22
18
15
13
are legitimate programs that allow unauthorized access
are hacker programs that do not show up on the system
really do not usually work
usually are immediately discovered
is used for analysing paging problems
is used for analysing device busy problems
is used for analysing control-unit busy problems
is only shown on real-time displays
is more secure than end-to-end encryption
is less secure than end-to-end encryption
cannot be used in a large network
is used only to detect errors
should show any immediate performance problems
should show I/O, paging, and processor activity
need show only the I/O and processor activity
usually reports only on terminal displays