

1. The opportunity to create several equations for launching program files is called
a) creating a file
b) creating a folder
✒ <u>c) creating a directory</u>
d) creating a shortcut
2. Unless you specify otherwise most spreadsheet packages assume all cell addresses are
a) macros
b) relative cell reference
c) absolute cell reference
✒<u> d) mix cell references</u>
3. Which of the following is not a type of lcon
a) program icon
✒ <u>b) document icon </u>
c) folder icon
d) utility icon



Answer: Yes
Explanation:
Public key encryption is the encryption technique that is used for private keys and public keys for securing the system.Public key is used for encryption and private key is for decryption.Public keys can only open content of the system
- According to the question, public key encryption is secure for coffee shop customer payment process as they are stored on digital certificates in long form for verifying digital signature and encrypting information.Its computation is difficult to crack through power computer access.
- Other options is incorrect as encryption is not a problem for payment procedures. Thus, the correct option is yes ,public key encryption is secure method for coffee shop customers .
Keyboard and mouse are input/output
Webcam and microphone are audio/visual
Answer: a) N² files. b) 2N files.
Explanation:
if an user can choose freeely both the video and the audio quality, if they are stored separately, but the user can download any mix of them as a single file, the server must store one audio version for each video version, so it will need to store NxN = N² files.
If, instead, the server can send the audio and video streams separately, so the user can choose one of the N video available, and one of the N audio versions, the server will need to store only N video files + N audio audio files, i.e. , 2 N files.