Answer:
Social Engineering
Explanation:
Even if you invest in the best possible security infrastructure for your corporate network, you will still be vulnerable to attacks which exploit human shortcomings. An example is where an attacker manipulates a company employee to get the system access password in return for a favour. Now he can use the password to bypass all security infrastructure and gain access to critical data and code.
 
        
             
        
        
        
Answer:
A hardware and software support technician
Explanation:
If you provide your own web server, you also need <em>hardware and software support technicians</em> who will configure, manage, maintain and handle failures. 
<em>A Web development team</em> is needed either you own your server or you are on cloud. 
<em>The flexible subscription fee that varies upon the resources used </em>is an option in cloud.
<em>The market</em> does not response directly to the decision of server hosting
 
        
             
        
        
        
Answer:
"System"
Explanation:
<u>System</u> software consists of operating systems, utilities, device drivers, and language translators.
(not much explanation as it was a fill in the blank which explains itself haha)
Have a nice day!
     I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)
- Heather
 
        
             
        
        
        
Answer:
Desktop
Explanation:
A desktop computer is a personal computing machine designed to be used on top of a usual office desk.
It accommodate in it the physical hardware that makes a computer run and connects to input devices like the mouse, monitor, and keyboard users interact with. Desktop computers are mostly used in enterprise and business environment, including in consumer use cases such as for gaming. In the enterprise, they are vital since they are the major medium for many users to do their day to day jobs.