In ____, a shared secret key is used to encrypt the cleartext as well as decrypt the ciphertext.
A. public key cryptography
B. asymmetric encryption
C. asymmetric cryptography
D. private key cryptography
Answer: D
You might also like to view...
The page table for each process maintains _________ .
A) ?the physical memory location of the process B) ?the frame location for each page of the process C) ?the page location for each frame of the process D) ?the logical memory location of the process
What is the Big-Oh of the method lineDetect?
What will be an ideal response?
Class members are accessed via _________ the operator in conjunction with the name of an object (or reference to an object) of the class or via the _______ operator in conjunc- tion with a pointer to an object of the class.
Fill in the blank(s) with the appropriate word(s).
Information that is stored in rows and columns is referred to as a(n) ________
A) table B) array C) chart D) record