Answer:
it executes the commands sent to it by the applica software .
The answer is encryption
steganography would be hiding data, like in an image
digital forensics is the analysis done after an attack
and the last one is a security standard
Answer:
Demilitarized zone (DMZ).
Explanation:
Demilitarized zone is a kind of security assurance scheme used by network administrator to detect network breach even before it gets to the secured network.
The private LAN is protected with a firewall and a DMZ is configured to allow access by untrusted users, on another workstation, which is a duplicate of the companies private local address.
Answer:
trading as a whole
Explanation:
pls give brainlest almost lvled up.
Well the only one that is actually a piece of programming is A. Word Processing Program. B, C and D are all peripherals for a computer not actual software for it. Basically if you have to install it on the computer its software. Now B C and D may need software to make them compatible with your computer they themselves dont need to be installed.