Public key encryption uses one key to encrypt the messages and another key to decrypt it

Indicate whether the statement is true or false.


ANS: A

Computer Science & Information Technology

You might also like to view...

Each person's information is stored in a ____ in the contact list.

A. contact address B. contact record C. contract group D. contract file

Computer Science & Information Technology

Which conditional formatting option would you choose if you wanted to apply formatting to cells whose value falls between two numbers?

A) Highlight Cells Rules B) Between Values Rules C) Color Scales D) Top/Bottom Rules

Computer Science & Information Technology

Which of the following is a valid statement? (i) int num = new int(67);(ii) String name = new ("Doe");(iii) String name = "Doe";

A. Only (i) B. Only (i) and (ii) C. Only (iii) D. Only (ii) and (iii)

Computer Science & Information Technology

?Digital subscriber line comes in a variety of formats. Often collectively referred to as ____.

A. ?ADSL B. ?CDSL C. ?SDSL D. ?xDSL

Computer Science & Information Technology