Answer:
No. This is not more secure.
Explanation:
this is not more secure than having all of Carol, bob and Alice having the same key.
alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.
any of these 3 would have to know someone else's secret key to verify answers to any challenge.
the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.
Answer:
b. You can track changes.
Explanation:
Setting up a workbook to be shared if you are the only one using the workbook is to enable you track the changes that may occur.
When sharing a workbook, you can allow users gain access to it, make changes and then you easily track those changes.
It makes a team to work simultaneously on the same workbook.
Answer:
The correct answer to the following question will be "Θ(n2)
". The further explanation is given below.
Explanation:
If we're to show all the objects that exist from either the first as well as the second vector, though not all of them, so we'll have to cycle around the first vector, so we'll have to match all the objects with the second one.
So,
This one takes:
= 
And then the same manner compared again first with the second one, this takes.
= 
Therefore the total complexity,
= Θ(n2)