An _________ authenticates the sender of a document.

Fill in the blank(s) with the appropriate word(s).


digital signature.

Computer Science & Information Technology

You might also like to view...

A declaration allows you to test certain aspects of a program at compile time.

a. compile_time_test b. static_assert c. test d. check

Computer Science & Information Technology

A(n) _______________ backup is identical to an incremental backup, except that it doesn't turn off the archive bits.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In most productivity software packages, ________ are predefined forms that include specific designs, special formatting, and styles relevant to a document.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

____ is defined as the exchange of information over an unsecured medium that allows each of two parties, the sender and the recipient, to compute a value that will be used to construct a secret key for a symmetric cipher during the rest of the communication.

A. Message authentication code B. Digital certificate C. Key agreement D. Keyed hashes

Computer Science & Information Technology