Public-key encryption was developed in the late ________.

A. 1950s B. 1970s

C. 1960s D. 1980s


B. 1970s

Computer Science & Information Technology

You might also like to view...

Explain the factors that motivate the hybrid scheduling approach of the ‘scheduler activations’ design (instead of pure user-level or kernel-level scheduling).

What will be an ideal response?

Computer Science & Information Technology

What are the six basic art elements?

What will be an ideal response?

Computer Science & Information Technology

Bitmap images offer far more flexibility than vector images.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A(n) ________ is a special list created in Access to speed up searches and sorting

A) index B) guide C) relationship D) catalog

Computer Science & Information Technology