Well knowing how the government is with security id go with A. as it makes a lot of sense unlike B and D and if they were looking for software the question would mention it
Answer:
mobility and broad reach
Explanation:
The two major characteristics of mobile computing are:
Mobility: It basically refers to the portability. Mobility means that users can carry their mobile device wherever they go. This facilitates real-time communication with other devices. Users can take a mobile device anywhere and can contact with other devices and systems via a wireless network for example a user, wherever he happens to be, can log in to his email account to check his emails using his mobile phone.
Broad Reach: It basically means that the mobile device users can be reached at any time. This means that the users of an open mobile device can be instantaneously contacted. Having an open mobile device means that it can be reached by or connected to other mobile networks. However mobile users also have options to restrict specific messages or calls.
A business plan and a <u>financial plan</u> to show the both his plan to make money, and how much money he will make, spend, use.
Public key and private key - In public key encryption, a pair of keys is used (public key and private key). The public key can be made available publicly, while the private key is only known by the owner. The public key is used to encrypt the message, while the private key is used to decrypt the message.