<span>Financial transactions were one of the first purposes of computers. This is where "ticker tapes" came from; early computers were used to keep track of how stocks were performing. Computers in early days used large mainframe systems and punch cards to keep track of this type of data.</span>
If( caryear >= 2000 ):
print "probably has air bags.\n"
elif( caryear >= 1990 ):
print "probably has anti-lock brakes.\n"
elif( caryear >= 1970 ):
print "probably has seat belts.\n"
else:
print "probably has few safety features.\n"
Answer:
No. This is not more secure.
Explanation:
this is not more secure than having all of Carol, bob and Alice having the same key.
alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.
any of these 3 would have to know someone else's secret key to verify answers to any challenge.
the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.
Answer:
D. To ensure that the software adheres to technical standards
Explanation:
The responsibility of the software architect is to ensure that all parts of the software system are able to meet the requirements set forth by the project or specifications, in this case, the technical standards. This is an important piece of the software system because without it, the software system may not perform the necessary functions that it was written to do.
Cheers.
Answer: i believe a digital citizen
i am not 100% sure about that answer but i reaserached a little and thats what i found :)
I hope this helps u out a little a thank and a brainlist would be greatly appreciatecd :)