A(n) ____ is hardware (a computer) that can be used to share mail, databases, and more.

A. client
B. server
C. operating system
D. router

Answer: B

Computer Science & Information Technology

You might also like to view...

The protection of a database against intentional or accidental unauthorized access is known as database ____.

A. security B. encryption C. protection D. oversight

Computer Science & Information Technology

____________________ is the science of transforming information so that it is secure while it is being transmitted or stored.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology