Public key systems

a. use the same key for sending and receiving data
b. require users to exchange keys in advance
c. use asymmetric keys
d. can not be used to send digitally signed messages


c. use asymmetric keys

Computer Science & Information Technology

You might also like to view...

Suppose A is an anonymous inner class in Test. A is compiled into a file named _________.

a. A.class b. Test$A.class c. A$Test.class d. Test$1.class e. Test&1.class

Computer Science & Information Technology

Match the following terms to their meanings:

I. Calculated Control II. Bound Control III. Label Control IV. Text Box Control V. Date Control A. A control that retrieves its data from an underlying table or query B. A control that inserts the current time the form or report is opened C. A bound control that displays the data from the underlying table or query D. A control that contains descriptive information, usually a field name or title E. A control that contains an expression that most often summarizes a field that contains numerical data

Computer Science & Information Technology

A note inserted into the text of a research paper that refers the reader to a source in the bibliography

a. Footnotes b. Citation c. Bibliography

Computer Science & Information Technology

Which optical storage technology stores data permanently on a disc, which cannot be subsequently added to or changed?

A. Read-only B. Recordable C. Rewritable D. None of the above

Computer Science & Information Technology