The basic security in ____ comes from the fact it is relatively easy to multiply two huge prime numbers together to obtain their product, but it is computationally difficult to go the reverse direction.

A. ElGamal
B. DES
C. IDEA
D. RSA


Answer: D

Computer Science & Information Technology

You might also like to view...

A ____________ object displays text on a form.

a. Text b. Font c. Character d. Label

Computer Science & Information Technology

The ____ key allows the user to select a menu using the Alt key in combination with a letter or number.

A. access B. perform C. modify D. execute

Computer Science & Information Technology

A multimedia structure in which users may navigate freely, but are occasionally constrained to linear presentations, could be called ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Of all of the concepts Sheila has learned so far, she is having the hardest time understanding the use of procedures, including when and how to use them. She asks her instructor for some additional clarification. Which of the following is not a true statement her instructor makes to Sheila?

A. The Sub procedure should perform a single, defined task. B. Procedures that perform multiple tasks tend to become large and difficult to design and code. C. A Function procedure must perform reasonably substantial processing. D. It is a good practice to place a procedure call statement in a calling procedure and have the called procedure contain one or two program statements.

Computer Science & Information Technology