Public-key encryption is also known as ___________ .

A. digital-key encryption
B. asymmetric encryption
C. one-way time-exchange encryption
D. optimal-key encryption


B. asymmetric encryption

Computer Science & Information Technology

You might also like to view...

The ________ Theme is the default theme setting

Fill in the blank(s) with correct word

Computer Science & Information Technology

You can use ________ to bring your PC back to its original factory settings

A) System Restore B) PC Reset C) System Image D) PC Restore

Computer Science & Information Technology

The range of sounds that a speaker can output is known as the _______

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which RAID level mirrors each other on two drives, causing changes from one hard disk to reflect on the other drive?

a. 0 b. 1 c. 0+1 d. 5

Computer Science & Information Technology