The concept of two keys, public and private, is called ____ cryptography.?
A. ?private key
B. ?public key
C. ?secret key
D. ?symmetric
Answer: B
Computer Science & Information Technology
You might also like to view...
A file written in XML Schema typically ends with the ____ file extension.
A. .xsd B. .xst C. .xsl D. .xs
Computer Science & Information Technology
What is the complexity of the selection sort algorithm in the best case scenario?
a. O(n^2) b. O(1) c. O(n) d. O(log (n))
Computer Science & Information Technology
Which one of the following choices describes a gadget?
A) mini-application B) virus C) program D) utility
Computer Science & Information Technology
To correctly position the date and closing lines in a modified block letter, set a tab at _____.
A. 3.0" B. 3.25" C. 3.5" D. 4.0"
Computer Science & Information Technology