Public-key encryption is based on a ____.

A. message authentication code (MAC)
B. certificate
C. hash value
D. key


Answer: C

Computer Science & Information Technology

You might also like to view...

A compound statement that contains variable declarations is called a __________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If you want to see tasks listed with their markings of High, Normal, and Low, you can display the tasks in the ____ view.

A. Status B. Ranked C. Prioritized D. Detailed

Computer Science & Information Technology

With an ascending bubble sort, after each adjacent pair of items in a list has been compared once, the largest item in the list will have risen to the top.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Fields that appear to hold multiple values are known as ________

A) compound parameters B) expression fields C) multiexpression fields D) multivalued fields

Computer Science & Information Technology