Which of the following is true about asymmetric encryption algorithms?

A. they use a secret key
B. the same key is used to encrypt and encrypt data
C. the performance is slower than with symmetric algorithms
D. it is the most commonly used form of encryption


Answer: C

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) To add an item to a ListBox use the Add method of the Items property. 2) To remove an item from a ListBox, use the Delete method of the Items property. 3) The SelectedIndex property returns the index of the selected item. 4) If the user has not selected any items from the ListBox then SelectedIndex returns 0.

Computer Science & Information Technology

What is the value of number after the following statements execute?

int number; number = 18 % 4 + 2; a. 3 b. 4 c. 6.5 d. 0 e. unknown

Computer Science & Information Technology

A geotag contains the altitude and magnitude coordinates of where a photo was taken in order to plot it on a map.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Match each item with a statement below.

A. A list of data items that all have the same data type and the same name but are distinguished from each other by a subscript or index. B. An individual object within an array. C. An integer contained within square brackets that indicates the position of one of an array's elements. D. A one-dimensional array in which each element is another array. E. Describes a value that can be accessed but not altered. F. Determines the pair of limiting values between which a value falls. G. Reverses the order of items in an array. H. Requires multiple subscripts to access the array elements. I. A term used by mathematicians to refer to a two-dimensional array. J. The list of values provided for an array.

Computer Science & Information Technology