Answer:
C
Explanation:
Well, in your inquiry it says
"A presentation software that is used to organize and present pertinent information using graphics, word processing, outlining, drawing, and presentation management tools"
We know it isn't Microsoft Word, because Microsoft Word doesn't have a presentation feature. We know it isn't Excel because Excel is only meant for spreadsheet and analytics data.
However, on PowerPoint all these points make sense, PowerPoint is a tool that Microsoft created for the capabilities such as to present information, you can also put information inside of graphics as well, you can also draw, and outline too.
Answer: Yes
Explanation:
Public key encryption is the encryption technique that is used for private keys and public keys for securing the system.Public key is used for encryption and private key is for decryption.Public keys can only open content of the system
- According to the question, public key encryption is secure for coffee shop customer payment process as they are stored on digital certificates in long form for verifying digital signature and encrypting information.Its computation is difficult to crack through power computer access.
- Other options is incorrect as encryption is not a problem for payment procedures. Thus, the correct option is yes ,public key encryption is secure method for coffee shop customers .
Answer:
All the three statements given are true so the correct option is option 4 which is none of the above.
Explanation:
The options are given in a jumbled up form the options are sorted which are as follows:
- SOA eliminates the use of application boundaries, the traditional methods where security is at the application level aren't likely to be effective
- An atomic service cannot be decomposed into smaller services that provide a useful function
- XML security service may be found in retail application communication.
- None of the mentioned
SOA stands for Service Oriented Architecture. This eliminates the application boundaries so option 1 is true.
An atomic service is defined as the smallest service which cannot be divided further. So this is true as well
The XML security service is incorporated in all retail applications. so this is true as well.
So the remaining option is just None of the mentioned.
Answer:
a
Explanation:
Database Management System (DBMS) makes a relational database available for different analytical views.
Explanation:
Types of network devices
Hub.
Switch.
Router.
Bridge.
Gateway.
Modem.
Repeater.
Access Point.
HOPE THIS HELPS YOU THANK YOU.