A __________ is an algorithm that requires the use of a secret key.
A. DAA
B. SHA
C. GCM
D. MAC
D. MAC
Computer Science & Information Technology
You might also like to view...
With the frame value ____, a border is drawn around all four sides of the table.
A. box B. asides C. 4sides D. all
Computer Science & Information Technology
Which of the following takes precedence over multiplication?
A. division B. exponentiation C. addition D. subtraction
Computer Science & Information Technology
When you click the _____ Background button in the Adjust group on the Picture Tools Format tab, part of the photograph is marked to be removed and part of it is marked to be retained.
A. Edit B. Keep C. Merge D. Remove
Computer Science & Information Technology
When using a ring topology, a ____ can be used to connect to another network that uses the same protocol.
A. star B. central controller C. router D. bridge
Computer Science & Information Technology