What alternative term can be used to describe asymmetric cryptographic algorithms?
A. user key cryptography
B. public key cryptography
C. private key cryptography
D. cipher-text cryptography
Answer: B
Computer Science & Information Technology
You might also like to view...
CSS2 included the ____ rule, which you use to specify media dependencies for style sheets.
A. @styles B. @media C. @all D. @depend
Computer Science & Information Technology
Which of the following networking devices can exist at several layers of the OSI model at the same time? (Select TWO).
A. Switch B. Cable C. Repeater D. Router E. Bridge F. Hub
Computer Science & Information Technology
A sector is the basic unit of data storage on a hard disk, which is usually 64 KB.
a. true b. false
Computer Science & Information Technology
The value returned by a non-void function can be used or discarded.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology