2. Identify the function of computer hardware components
Answer:
True
Explanation:
In Computer science, It's true that injection attacks variants can occur whenever one program invokes the services of another program, service, or function and passes to it externally sourced, potentially untrusted information without sufficient inspection and validation of it.
Answer:
Memory.
Explanation:
When someone refers to "space" on a computer or device, they are usually referring to memory, which allows the user to save a file for future use, even after the computer has been turned off.
In Computer science, a memory is a term used to describe the available space or an electronic device that is typically used for the storage of data or any computer related information such as images, videos, texts, music, codes and folders. There are basically two (2) main types of memory;
1. Read only memory (ROM).
2. Random access memory (RAM).
To modify the border of a cell or cells, click the borders button in the font___ group of the home tab