Answer:
The correct answer to the following question will be "Metadata".
Explanation:
Metadata is "information providing information on other data" This is "data about data", in other words.
There are many subareas of metadata, including:
- Structural metadata
- Iscriptive metadata
- Statistical metadata
- Reference metadata
- Administrative metadata
Metadata gives a summary of the features of the data and the collection of relationships that connect the data found in the database.
It defines other details, is a prefix in most uses of computing means "an underlying meaning or description. Very simple document metadata are, for example, creator, date generated and date changed and file size.
Therefore, Metadata is the right answer.
Answer: Option (c) is correct
Explanation:
PDF is portable document format that come in form of file format .It is used for sharing and transmitting between computing and operating systems for viewing and printing in actual page layout. They can be used fro eBooks ,scanned document and text etc.
- Other options are incorrect because not all business organization use PDF, PDF has the capability of being edited and it stands for "portable document format".
- Thus, the correct option is option(c)
Answer:
Cloud computing is the correct answer of this question.
Explanation:
Cloud computing presents a easy way of consuming databases, servers, repositories and a vast variety of web technology infrastructure.Cloud computing allows that can save considerable construction costs without relying on internal server resources and device requirements.Cloud computing is the provision of various resources over the Web.
Answer:
Explanation:
You most likely lost 1000 points because you cheated to get them if not there is a possibility you were.
Answer:
No. This is not more secure.
Explanation:
this is not more secure than having all of Carol, bob and Alice having the same key.
alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.
any of these 3 would have to know someone else's secret key to verify answers to any challenge.
the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.