The reverse of the asymmetric encryption process yields ____.
A. digital signatures
B. certificate authorities
C. DES
D. a Rijndael round
Answer: A
You might also like to view...
The -- operator
A) is a unary operator. B) subtracts one from the value of its operand. C) must have an l value, such as a variable, as its operand. D) can be used in either prefix or post fix mode. E) All of the above are true.
A ____ stores information in tables composed of columns and rows, similar to the format used in a spreadsheet.
A. relational database B. relational computer C. relational base D. relational data
When a program is executing, and it reaches a declaration of an object variable, where does the program execution automatically go to next?
A. The class destructor. B. The class constructor. C. The class instructor. D. The class scope operator.
Which of the following is NOT an Analysis Toolpak tool?
A) Histogram B) Standard deviation C) Covariance D) Analysis of variance