Answer:
To find the solution of Global warming, to find the combination of some drugs and test them, etc.
Explanation:
Distributed computing can be described as when a number of computers connected on the network communicate with each other by passing messages, and these systems are known as distributed systems.
There are various goals that can be accomplished using distributed computing, one of them is to find the solution of Global warming, by coordinating with different areas.
Another one is to find the combination of some drugs and test them to make new medicine.
Answer:
#include<stdio.h>
#include<stdlib.h>
int main(void){
int seedval;
scanf ("%d", &seedval);
srand(seedval);
printf("%d\n", rand()%10);
printf("%d\n", rand()%10);
return 0;
}
Explanation:
The given code is poorly formatted. So, I picked what is usable from the code to write the following lines of code:
#include<stdio.h>
#include<stdlib.h>
int main(void){
This line declares seedval as integer
int seedval;
This line gets user input for seedval
scanf ("%d", &seedval);
This line calls the srand function to generate random numbers
srand(seedval);
This prints a random number between 0 and 9
printf("%d\n", rand()%10);
This also prints a random number between 0 and 9
printf("%d\n", rand()%10);
return 0;
}
Answer:
B. Implement a key escrow.
Explanation:
A key escrow can be defined as a data security method of storing very essential cryptographic keys.
Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.
As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.
Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).
In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.