The concept of two keys, public and private, is called ____ cryptography.?

A. ?private key
B. ?public key
C. ?secret key
D. ?symmetric


Answer: B

Computer Science & Information Technology

You might also like to view...

A file written in XML Schema typically ends with the ____ file extension.

A. .xsd B. .xst C. .xsl D. .xs

Computer Science & Information Technology

What is the complexity of the selection sort algorithm in the best case scenario?

a. O(n^2) b. O(1) c. O(n) d. O(log (n))

Computer Science & Information Technology

Which one of the following choices describes a gadget?

A) mini-application B) virus C) program D) utility

Computer Science & Information Technology

To correctly position the date and closing lines in a modified block letter, set a tab at _____.

A. 3.0" B. 3.25" C. 3.5" D. 4.0"

Computer Science & Information Technology