____ cryptography enables exchange of secure messages between parties without prior arrangement to exchange keys.
A. Public key
B. Secret key
C. Symmetric
D. Private key
Answer: A
Computer Science & Information Technology
You might also like to view...
The strategy of deadlock _________ is to design a system in such a way that the possibility of deadlock is excluded.
A) ?prevention ? B) ?detection ? C) ?diversion ? D) ?avoidance
Computer Science & Information Technology
An addition to a cmdlet that controls the action of the cmdlet is called which of the following?
A. autocomplete B. switch C. option D. selection
Computer Science & Information Technology
LinkedIn's equivalent of Facebook friends is called contacts
Indicate whether the statement is true or false
Computer Science & Information Technology
A bus is a pathway for bits representing data and instructions.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology