Answer:

Explanation:
Given

Required
Determine 
implies 10th percentile and this is calculated as thus

Where n is the number of data; n = 14

Substitute 14 for n


Open the bracket



This means that the 1.5th item is 
And this falls between the 1st and 2nd item and is calculated as thus;

Express 1.5 as 1 + 0.5


From the given data;
and 
becomes




The recommended secure protocol for voice and video applications is the Secure<span> Real-time Transport </span>Protocol<span> (SRTP) protocol. SRTP is a Real-time Transport </span>Protocol (RTP) profile used to to provide encryption, message authentication and integrity.
The default cipher of SRTP is the Advanced Encryption Standard<span> (AES) .</span>
Sometimes I just meet some Unintelligen ppl
Answer:
Discretionary Access Control model
Explanation:
Discretionary Access Control (DAC) gives owners of a resource full control of objects/items they have created or been given access to, this also includes sharing the objects/items with other subjects. These owners have control over their data and maintain access through ACLs. The access-control list (ACL), is a list of permissions attached to an object in a computer file system.
The Owners can decide to grant other users access to their files, change their attributes, alter them, or delete them. DACs are discretionary because the owner can transfer information access to other users.