A(n) ____ is hardware (a computer) that can be used to share mail, databases, and more.
A. client
B. server
C. operating system
D. router
Answer: B
Computer Science & Information Technology
You might also like to view...
The protection of a database against intentional or accidental unauthorized access is known as database ____.
A. security B. encryption C. protection D. oversight
Computer Science & Information Technology
____________________ is the science of transforming information so that it is secure while it is being transmitted or stored.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology