Public-key encryption was first publicly proposed by __________ in 1976.

Fill in the blank(s) with the appropriate word(s).


Diffie and Hellman

Computer Science & Information Technology

You might also like to view...

With coarse and __________ grained parallelism, there is synchronization among processes, but at a very gross level.

A) ?medium ? B) ?fine ? C) ?independent ? D) ?very course

Computer Science & Information Technology

The technique to solve a problem by subdividing into smaller problems is known as divide-and- conquer and ____ design approach.

A. top-down B. bottom-up C. leveled D. driver and stub

Computer Science & Information Technology

Which alignment spreads the text evenly between the left and right margins so that text begins at the left margin and ends uniformly at the right margin?

A) Left B) Right C) Center D) Justified

Computer Science & Information Technology

Which of the mode options opens a file for writing only, overwriting any existing text by placing the pointer at the beginning of the file.

A. w B. w+ C. a D. a+

Computer Science & Information Technology