Public-key encryption is based on a ____.
A. message authentication code (MAC)
B. certificate
C. hash value
D. key
Answer: C
You might also like to view...
A compound statement that contains variable declarations is called a __________.
Fill in the blank(s) with the appropriate word(s).
If you want to see tasks listed with their markings of High, Normal, and Low, you can display the tasks in the ____ view.
A. Status B. Ranked C. Prioritized D. Detailed
With an ascending bubble sort, after each adjacent pair of items in a list has been compared once, the largest item in the list will have risen to the top.
Answer the following statement true (T) or false (F)
Fields that appear to hold multiple values are known as ________
A) compound parameters B) expression fields C) multiexpression fields D) multivalued fields