A _______ is a computer running software that allows it to share resources over a network. it may share programs or data.
C. Server
Answer:
Use a firewall
Install antivirus software.
Explanation:
Answer: Geotagging was enabled on her smartphone
Explanation:
The security weakness that is the most likely cause of the security breach is that geotagging was enabled on the vice president's smartphone.
Geotagging, occurs when geographical identification metadata are added to websites, photograph, video, etc. Geotagging can be used to get the location of particular place.
In this case, since geotagging was enabled on her smartphone, it was easy for the attacker to locate her house.
Answer:
The answer is "Text editor".
Explanation:
It is a computer program, which is used to provide editing on the plain text, and for this editing, we use a text editor. This tool differs from word processors software because it doesn't add additional text editing metals. In this tool, we also write the HTML code, and the incorrect choice can be defined as follows:
- HyperText is a wrong choice because in these two or more pages are linked and it is used to move from one page to another.
- The Web browser is also a wrong choice because it is used to display the design of the web page.
- Operating software is also a wrong choice because it system software in which all things are done.
Answer:
the advantages of database in 5 points are as follows
Explanation:
Data Integrity. Data integrity means data is consistent and accurate in the database. ...
Data Security. Data security is a vital concept in a database. ...
Better data integration. ...
Minimized Data Inconsistency. ...
Faster Data Access. ...
Better decision making. ...
Simplicity. ...
Recovery and Backup.