When only the two parties involved in sending a message have the code, this is called ________-key encryption

A) private
B) foreign
C) public
D) protocol


A

Computer Science & Information Technology

You might also like to view...

Which of the following is not a difference between hex and setbase?

a. setbase is a parameterized stream manipulator and hex is not. b. setbase is provided by a different header file than hex. c. setbase(16) and hex have different effects on stream output. d. setbase takes an argument but hex does not.

Computer Science & Information Technology

Which of the following defines the C-string containing “Hello”?

a. char stringVar[10] = “Hello”; b. char stringVar[10] = {‘H’, ‘e’, ‘l’, ‘l’, ‘o’}; c. char stringVar[10] = {‘H’, ‘e’, ‘l’, ‘l’, ‘o’, ‘\0’}; d. char stringVar[6] = “Hello”; e. char stringVar[] = “Hello”;

Computer Science & Information Technology

The Web Archive, single file format is supported by all Web browsers

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is true of thick-client applications?

A. A thick-client application is an application program that need not be preinstalled on the client. B. All other things being equal, thin-client applications are preferred over thick client applications. C. A thick-client application does not require preinstallation of client code. D. In large organizations which use thick-client applications, update installation and version management are inexpensive.

Computer Science & Information Technology