____ are used by programs on the Internet (remote) and on a user's computer (local) to confirm the user's identity to any third party concerned.?
A. ?Symmetric keys
B. ?Symmetric encryption algorithms
C. ?Digital signatures
D. ?SMTP and IMAP
Answer: C
Computer Science & Information Technology
You might also like to view...
In Java, __________ must be declared before they can be used.
a. variables b. literals c. key words d. comments
Computer Science & Information Technology
To change Proofing tool settings, first display the:
A) References tab B) Backstage C) Home tab
Computer Science & Information Technology
If no caption has been set for a field, the label will default to the field name
Indicate whether the statement is true or false
Computer Science & Information Technology
The ________ on a computer is the master user account that has the authority to add new users
A) lead user B) supervisor C) administrator D) executive
Computer Science & Information Technology