Anomaly detection involves actual software that works to detect intrusion attempts and notify the administrator. The system looks for any anomalous behavior. Any activity that does not match the pattern of normal user access is noted. Go to Google.com and search for information on how anomaly detection works and then answer the question: How does the IDS define normal use? A good place to find information about IDS system types is http://infosecuritymag.techtarget.com/articles/august01/cover.shtml.
All applicants go through a series of tests that check their level of English and knowledge of formatting styles. The applicant is also required to present a sample of writing to the Evaluation Department. If you wish to find out more about the procedure, check out the whole process.