The motherboard contains the central electronic components of the computer.
        
             
        
        
        
Answer:
a) RFID tags
Explanation:
yeah they're super expensive but keep everything secure so nothing gets in it .
 
        
             
        
        
        
Answer:
Pseudocode is an artificial and informal language that helps programmers develop algorithms. Pseudocode is a "text-based" detail (algorithmic) design tool. The rules of Pseudocode are reasonably straightforward. All statements showing "dependency" are to be indented. These include while, do, for, if, switch.
 
        
             
        
        
        
Answer:
The operating system must by the use of policies define access to and the use of all computer resources.
Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.
Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:
- General Policies
- Server Policies
- VPN Policies
- Back-Up Policies
- Firewall Access and Configuration Policies
Cheers!