In 1976, Whitfield Diffie and Martin Hellman, researchers at Stanford University, developed_______ to solve the problem of exchanging keys securely.
a) public-key cryptography.
b) symmetric-key cryptography.
c) private-key cryptography.
d) None of the above.
a) public-key cryptography.
You might also like to view...
A(n) ____ guides you through the installation process.
A. setup module B. install module C. Automatic Update D. portable application
What is the value in n after line 4 is run?
``` 1 string s, t; 2 s = “Get up and go to school!”; 3 t = “NO!”; 4 int n = s.size(); 5 int w = s.at(3); 6 int x = s.at(12); 7 s += t; 8 cout << s; ``` A. 23 B. 24 C. 3 D. -1
A(n) _____ file contains the object that is displayed in the destination file.
A. source B. object C. beginning D. completed
When setting up a network, which of the following is the suggested order for turning on equipment?
A) Broadband modem, computers, router, and TVs B) Router, computers, TVs, and broadband modem C) Broadband modem, router, computers, and TVs D) Router, broadband modem, TVs, and computers