Answer:
<u>Algorithm()
</u>
1. p = Enter the price of item A.
2. c = Enter the number of A’s purchased.
3. Now the price per item with tax is:
t= p+(p*6/100)
4. The total cost of c items:
ct= t * c.
5. Print ct.
In this algorithm, we are taking the price per item and counting it’s cost including tax. Then we are multiplying the price per item with tax with the number of items we purchase, to find the overall cost with tax.
You may calculate the overall cost without tax as (p*c). Then you can find the overall cost with tax as ((p*c)+(p*c*6/100)), as in both way, we will get the same result.
Answer:
No. This is not more secure.
Explanation:
this is not more secure than having all of Carol, bob and Alice having the same key.
alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.
any of these 3 would have to know someone else's secret key to verify answers to any challenge.
the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.
Answer:
It's A. a CompTIA certificate and D. a Microsoft-certified desktop support
certificate
Explanation:
I got it right.
Before cellphones are able to be used to browse the internet, play games, record videos and take photos, its main purpose is similar to a telephone, albeit it is more portable. Early cellphones would not have games for you to play, not would it have emails for you to check, read, and reply to. Though ringtones might seem as an acceptable option, early cellphones would also have many selections or even any for you to choose.
Thus, the best option would be (B) contact list, which is necessary for a cellphone to have since the owner would need the number to be able to make a call.