The reverse of the asymmetric encryption process yields ____.

A. digital signatures
B. certificate authorities
C. DES
D. a Rijndael round


Answer: A

Computer Science & Information Technology

You might also like to view...

The -- operator

A) is a unary operator. B) subtracts one from the value of its operand. C) must have an l value, such as a variable, as its operand. D) can be used in either prefix or post fix mode. E) All of the above are true.

Computer Science & Information Technology

A ____ stores information in tables composed of columns and rows, similar to the format used in a spreadsheet.

A. relational database B. relational computer C. relational base D. relational data

Computer Science & Information Technology

When a program is executing, and it reaches a declaration of an object variable, where does the program execution automatically go to next?

A. The class destructor. B. The class constructor. C. The class instructor. D. The class scope operator.

Computer Science & Information Technology

Which of the following is NOT an Analysis Toolpak tool?

A) Histogram B) Standard deviation C) Covariance D) Analysis of variance

Computer Science & Information Technology