Answer is:
avoiding free or pirated copies from public sources
Answer is:
both 1) the system can check for suspicious patterns of activity in an attempt to detect a security violation and 2) a time sharing a system that counts the number of incorrect passwords given
Answer is: