True however it’s also depends on where you live but for this purpose it’s true
        
             
        
        
        
Answer:
The advantages of e-government include an improved flow of information from citizen to government, government to citizen, and within government itself. Additionally, e-government helps modernize administration procedures, improving economies and promoting transparency in the process.
E-government is the use of technological communications devices, such as computers and the Internet, to provide public services to citizens and other persons in a country or region. 
 
        
             
        
        
        
Answer:
B
Explanation:
i’m an information technology  student and as I remember we used this  name
 
        
             
        
        
        
Answer:
It's your wish become other professions like doctor, engineer are also good. But in this profession you can make apps, websites and can do hacking. Which is are cool things to do. But every profession is best at it's profession. 
Explanation:
If you like my answer than please mark me brainliest
 
        
             
        
        
        
Answer:
Available options in question are 
- a firewall :  
 - a server
 - an application
 - control standard
 
Answer is : Control Standard. It is not an example of layer of security.
Explanation:
Defense in depth consists of three major domains like physical, technical and administrative. Layered Security will consists of best practices by combining multiple  security methods to mitigate vulnerabilities and attack vectors. It is used to protect resources at different levels.  
- A firewall is used as layered security measure to secure networks and systems.It is most commonly used security measure for enterprise products.
 - A server is typical example of physical control. In this  it protects actual IT servers, high-end servers, cloud servers and any physical hardware and assets.  
 - An Application can be used an example of Layer security. Applications like Antiviruses, Vulnerability Scanners, Anti Malware software and Web Application firewall gateways are typical examples
 
Control Standard is not an example of Layered Security.