PGP provides authentication through the use of _________
A. asymmetric block encryption B. symmetric block encryption
C. radix-64 D. digital signatures
D
You might also like to view...
Which of the following statements is true about the possession of wild animals?
A. The person who takes possession of a wild animal acquires its ownership rights, if the person acts in accordance with his or her hunting license. B. Individuals are never given personal ownership rights for wild animals. C. The ownership of the property on which a wild animal is taken is not a factor in the ownership of a captured wild animal. D. Wild animals caught in traps inside a private property are usually considered to be the property of the first person who finds the animal.
A practice called ________ allows marketers to use online data to target ads and offers to specific customers
A) online listening B) behavioral targeting C) social media tracking D) data analytics E) online targeting
The basic standards underlying the Internet are described in the:
A) Internet Standards Model. B) OSI Reference Model. C) ACSII Telecommunications Model. D) None of the above
What type of ternary relationship CANNOT be depicted as two binary relationships?
A) One-to-one-to-one B) Many-to-many-to-many C) One-to-one-to-many D) One-to-many-to-many