What is another name for public key encryption?

A. controlled key encryption
B. virtual key encryption
C. asymmetric key encryption
D. secure key encryption


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of these does the author think is the single best thing you can do to improve your site’s accessibility?

a. Make sure every image has Alt-text describing it b. Check the site with a validator c. Test it often and eliminate the most serious usability problems d. Use HTML heading elements correctly

Computer Science & Information Technology

A chart can be copied from and Excel spreadsheet and pasted into a PowerPoint slide

Indicate whether the statement is true or false

Computer Science & Information Technology

A small TCP window size produces few acknowledgments.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The condition that occurs when a hash function maps two or more distinct search keys into the same location is called a(n) ______.

a) disturbance b) collision c) rotation d) congestion

Computer Science & Information Technology