Answer:
TIFF file is not audio format file rather it is graphic container that stores raster images.
Explanation:
Gain can add all other audio files (MIDI, MP3, Windows media audio file) to his presentation.
What are MIDI, MP3 and WMA :
MIDI:
Musical Instrument Digital Interface (MIDI) is a protocol that is designed for recording and playback music on digital synthesizers that is supported by many computer sound cards. Gian can add MIDI audio format file in his presentation.
MP3:
This audio file format technology compress a sound technology into very small file while preserving the original quality of sound when it is played. Gian can add this audio format in presentation to play audio in presentation.
WMA
This audio format is developed by Microsoft. It contains a series of audio codecs and their corresponding audio formats.
Gian can add WMA extension audio file to his presentation to play audio.
Answer:
a. 1 is a packet, 2 is data, 3 is a frame.
Explanation:
And what is not mentioned is segment which used TCP/UDP and is part of Transport layer. The packet carries the destination and sender IP address, and is part of the Network Layer. The frame has the Mac address of destination device and senders device and is part of data link layer.
Hence segment has no IP address, hence b. is not correct. Also, data cannot have the IP Address, and Frame has the MAC address, Hence, the above answer. And this arrangement is part of Data Encapsulation.
Also keep in mind data can be anything like a series of bits, or any and it can or not have a header.
Answer:
To create a public key signature, you would use the <u>_private_</u> key.
Explanation:
To create a public key signature, a private key is essential to enable authorization.
A private key uses one key to make data unreadable by intruders and for the data to be accessed the same key would be needed to do so.
The login details and some important credentials to access user data contains both the user's public key data and private key data. Both private key and public key are two keys that work together to accomplish security goals.
The public key uses different keys to make data readable and unreadable.
The public key is important to verify authorization to access encrypted data by making sure the access authorization came from someone who has the private key. In other words, it's a system put in place to cross-check the holder of the private key by providing the public key of the encrypted data that needed to be accessed. Though, it depends on the key used to encrypt the data as data encrypted with a public key would require a private key for the data to be readable.
In psuedocode it would be:
length = input()
width = input()
area = length * width
print(area + " sq ft");