Public key systems
a. use the same key for sending and receiving data
b. require users to exchange keys in advance
c. use asymmetric keys
d. can not be used to send digitally signed messages
c. use asymmetric keys
You might also like to view...
Suppose A is an anonymous inner class in Test. A is compiled into a file named _________.
a. A.class b. Test$A.class c. A$Test.class d. Test$1.class e. Test&1.class
Match the following terms to their meanings:
I. Calculated Control II. Bound Control III. Label Control IV. Text Box Control V. Date Control A. A control that retrieves its data from an underlying table or query B. A control that inserts the current time the form or report is opened C. A bound control that displays the data from the underlying table or query D. A control that contains descriptive information, usually a field name or title E. A control that contains an expression that most often summarizes a field that contains numerical data
A note inserted into the text of a research paper that refers the reader to a source in the bibliography
a. Footnotes b. Citation c. Bibliography
Which optical storage technology stores data permanently on a disc, which cannot be subsequently added to or changed?
A. Read-only B. Recordable C. Rewritable D. None of the above