Answer:
b. server
Explanation:
A server serves responses to requests from client objects.
This is true because you can go and check yourself in Word and you can click on an image and the sizing handles will appear.
hope that helps :)
Answer:
The answer is "Remote access
"
Explanation:
The capacity to access another computer or network that you do not have. Remote computer access provides an employee with remote access to the desktop and file. This assists an employee, for example, who works at home efficiently.
Remote users access documents or other resources on any network-connected device or server, enhancing organizational efficiency and increase there are to cooperate more interact with peers nation.
Answer:
The answer is "The PC should be kept in a physically secure location".
Explanation:
In general, malicious users are hackers as well as malicious users. This user indicates that even a rogue worker, contractor, student, and another consumer who uses his sensitive rights is indeed a common word of violation of information in security circles and the headlines, and to manage the data from the theft the system should be on the physically secure location, that refers to any place, a room or a group of room within facilities of physical or staff security protocols that are sufficient to support the AI-based on LEIN and related Is a physically safe room.
Sorry I don't understand your question