The __________ encryption scheme is designed to enable encryption by a user's public key with decryption by the user's private key.
Fill in the blank(s) with the appropriate word(s).
ElGamal
You might also like to view...
The Open Data Center Alliance (ODCA) lists ________ as principal requirements for a modern networking approach.
A) Maintainability, vendor dependence, and adaptability B) Vendor dependence, automation, and mobility C) Adaptability, integrated security, and on-demand scaling D) Model management, vendor dependence, and integrated security
________ counteracts camera shake and allows you to take sharper images
A) Shutter lag B) Fixed-focus C) Burst mode D) Image stabilization
Using two keys in combination to perform an action is known as a(n) ________
A) quick method B) quick key C) keyboard cheat D) keyboard shortcut
Using ________ orientation causes the document to have a page width greater than its page height
A) landscape B) portrait C) justified D) paragraph