Asymmetric encryption is also known as ___________ .

A. public-key encryption
B. private-key encryption
C. optimal-key encryption
D. digital-key encryption


A. public-key encryption

Computer Science & Information Technology

You might also like to view...

Operational threats frequently originate from ____.

A. internal sources B. external sources C. known sources D. unknown sources

Computer Science & Information Technology

Which of the following statements makes the text in a JTextField uneditable?

a. textField.setEditable(true); b. textField.setEditable(false); c. textField.setUneditable(true); d. textField.setUneditable(false);

Computer Science & Information Technology

___________ enable you to add new capabilities to existing types.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Access provides a command to export data to slides in a PowerPoint presentation

Indicate whether the statement is true or false

Computer Science & Information Technology