Answer:
Visibility and configuration of security.
Explanation:
The visibility and configuration of security represents a set of features that enables the user to inform himself whether a security feature is in operation or not and whether the use and provision of services should depend on the security feature.
True, personalization is definitely part of this.
<span>B) storing information and documents, pictures</span>
Answer:
A. Sandboxing
Explanation:
The best solution to apply for this task would be Sandboxing. This is a software management strategy that isolates applications from critical system resources and other programs. In doing so you effectively add a secondary security layer on top of the application in order to prevent any and all malware from entering and damaging your overall system. Thus effectively reducing the risk.
7 Basic Internal Component found in a computer tower:
1) Power Supply
2) Central Processing Unit (CPU)
3) Hard Disk Drive (HDD)
4) Motherboard
5) Video card
6) Random Access Memory (RAM)
7) Sound Card
*Expansion Card, Network Card, Bluetooth Card