__________ provide authentication which can legally prove who sent a message over a network.

a. Digital signatures
b. DES keys
c. Directory keys
d. Screen names
e. User Ids


Ans: a. Digital signatures

Computer Science & Information Technology

You might also like to view...

When updating a control from a non-GUI thread, you must ________.

a) launch a separate thread to perform the update b) notify the GUI thread that you’ll be updating it in another thread c) ensure that the update doesn’t corrupt the GUI thread’s activities. d) schedule that update to be performed by the GUI thread

Computer Science & Information Technology

Which of the following XML attribute names is invalid?

(a) _notvalid (b) I am not valid (c) not-valid.1 (d) _not1valid2

Computer Science & Information Technology

A(n) ________ changes data from one network to a format another network can understand

Fill in the blank(s) with correct word

Computer Science & Information Technology

Input a fuel tank (capacity and current) from input stream

What will be an ideal response?

Computer Science & Information Technology