____ are used by programs on the Internet (remote) and on a user's computer (local) to confirm the user's identity to any third party concerned.?

A. ?Symmetric keys
B. ?Symmetric encryption algorithms
C. ?Digital signatures
D. ?SMTP and IMAP


Answer: C

Computer Science & Information Technology

You might also like to view...

In Java, __________ must be declared before they can be used.

a. variables b. literals c. key words d. comments

Computer Science & Information Technology

To change Proofing tool settings, first display the:

A) References tab B) Backstage C) Home tab

Computer Science & Information Technology

If no caption has been set for a field, the label will default to the field name

Indicate whether the statement is true or false

Computer Science & Information Technology

The ________ on a computer is the master user account that has the authority to add new users

A) lead user B) supervisor C) administrator D) executive

Computer Science & Information Technology