Public-key encryption is also known as ___________ .
A. digital-key encryption
B. asymmetric encryption
C. one-way time-exchange encryption
D. optimal-key encryption
B. asymmetric encryption
Computer Science & Information Technology
You might also like to view...
The ________ Theme is the default theme setting
Fill in the blank(s) with correct word
Computer Science & Information Technology
You can use ________ to bring your PC back to its original factory settings
A) System Restore B) PC Reset C) System Image D) PC Restore
Computer Science & Information Technology
The range of sounds that a speaker can output is known as the _______
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which RAID level mirrors each other on two drives, causing changes from one hard disk to reflect on the other drive?
a. 0 b. 1 c. 0+1 d. 5
Computer Science & Information Technology