The most commonly used public-key algorithm is_______, an encryption system developed in 1977 by MIT professors Ron Rivest, Adi Shamir and Leonard Adleman.

a) PGP.
b) RSA.
c) PKA.
d) None of the above.


b) RSA.

Computer Science & Information Technology

You might also like to view...

____________________ is a guarantee that there are no duplicate records in a table, that each record is unique, and that no primary key field contains null values.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

List the advantages of personalization from the viewpoint of a company. Do these advantages benefit users as well? Explain.

What will be an ideal response?

Computer Science & Information Technology

If no sort criteria are specified when creating a query, Access will sort the results by the ________

A) foreign key B) primary key C) first text field D) first numeric field

Computer Science & Information Technology

A(n) ________ file maintains the formatting of your file, regardless of what type of computer on which the file is open

A) DOCX B) XLSX C) PPTX D) PDF

Computer Science & Information Technology