____ cryptography enables exchange of secure messages between parties without prior arrangement to exchange keys.

A. Public key
B. Secret key
C. Symmetric
D. Private key


Answer: A

Computer Science & Information Technology

You might also like to view...

The strategy of deadlock _________ is to design a system in such a way that the possibility of deadlock is excluded.

A) ?prevention ? B) ?detection ? C) ?diversion ? D) ?avoidance

Computer Science & Information Technology

An addition to a cmdlet that controls the action of the cmdlet is called which of the following?

A. autocomplete B. switch C. option D. selection

Computer Science & Information Technology

LinkedIn's equivalent of Facebook friends is called contacts

Indicate whether the statement is true or false

Computer Science & Information Technology

A bus is a pathway for bits representing data and instructions.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology