What is another name for public key encryption?
A. controlled key encryption
B. virtual key encryption
C. asymmetric key encryption
D. secure key encryption
Answer: C
You might also like to view...
Which of these does the author think is the single best thing you can do to improve your site’s accessibility?
a. Make sure every image has Alt-text describing it b. Check the site with a validator c. Test it often and eliminate the most serious usability problems d. Use HTML heading elements correctly
A chart can be copied from and Excel spreadsheet and pasted into a PowerPoint slide
Indicate whether the statement is true or false
A small TCP window size produces few acknowledgments.
Answer the following statement true (T) or false (F)
The condition that occurs when a hash function maps two or more distinct search keys into the same location is called a(n) ______.
a) disturbance b) collision c) rotation d) congestion