What alternative term can be used to describe asymmetric cryptographic algorithms?

A. user key cryptography
B. public key cryptography
C. private key cryptography
D. cipher-text cryptography


Answer: B

Computer Science & Information Technology

You might also like to view...

CSS2 included the ____ rule, which you use to specify media dependencies for style sheets.

A. @styles B. @media C. @all D. @depend

Computer Science & Information Technology

Which of the following networking devices can exist at several layers of the OSI model at the same time? (Select TWO).

A. Switch B. Cable C. Repeater D. Router E. Bridge F. Hub

Computer Science & Information Technology

A sector is the basic unit of data storage on a hard disk, which is usually 64 KB.

a. true b. false

Computer Science & Information Technology

The value returned by a non-void function can be used or discarded.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology