Answer:
The flashdrive can hold 35389 400-pages-books
Explanation:
If
of a page occupies 1 kB of memory, we can calculate how much memory a book will take

Now that we know that a book average file size is about 266,67 kB, we calculate how many of them can a 9 GB flash drive hold.
To do the calculation, we have to know how many kilobytes are in 9 gigabytes.
There is 1024 kilobytes in a megabyte, and 1024 megabytes in a gigabyte, so:

Finally, knowing the average file size of a book and how much memory in kilobytes the 9 GB flash drive holds, we calculate how many books can it hold.

The flashdrive can hold 35389 400-pages-books, or 14155776 pages of typical text.
Cone cells, or cones, are one of three types of photoreceptor cells in the retina of mammalian eyes. They are responsible for color vision and function best in relatively bright light, as opposed to rod cells, which work better in dim light.
Answer:
Reorganize the network into smaller groups and connect each group to a router.
Explanation:
The user presently has 15 switches linked to another switch, with such an avg of 20 locations. The switches are linked to each other in such a manner that almost all systems can convey within a single Local area network. The high percentage to broadcast frames were found on that Local area network. They believe the amount of broadcasts could affect throughput.
So, they would reorganize each network into smaller units and link to such a router for each unit.
Answer:
To create a public key signature, you would use the <u>_private_</u> key.
Explanation:
To create a public key signature, a private key is essential to enable authorization.
A private key uses one key to make data unreadable by intruders and for the data to be accessed the same key would be needed to do so.
The login details and some important credentials to access user data contains both the user's public key data and private key data. Both private key and public key are two keys that work together to accomplish security goals.
The public key uses different keys to make data readable and unreadable.
The public key is important to verify authorization to access encrypted data by making sure the access authorization came from someone who has the private key. In other words, it's a system put in place to cross-check the holder of the private key by providing the public key of the encrypted data that needed to be accessed. Though, it depends on the key used to encrypt the data as data encrypted with a public key would require a private key for the data to be readable.