The most commonly used public-key algorithm is_______, an encryption system developed in 1977 by MIT professors Ron Rivest, Adi Shamir and Leonard Adleman.
a) PGP.
b) RSA.
c) PKA.
d) None of the above.
b) RSA.
You might also like to view...
____________________ is a guarantee that there are no duplicate records in a table, that each record is unique, and that no primary key field contains null values.
Fill in the blank(s) with the appropriate word(s).
List the advantages of personalization from the viewpoint of a company. Do these advantages benefit users as well? Explain.
What will be an ideal response?
If no sort criteria are specified when creating a query, Access will sort the results by the ________
A) foreign key B) primary key C) first text field D) first numeric field
A(n) ________ file maintains the formatting of your file, regardless of what type of computer on which the file is open
A) DOCX B) XLSX C) PPTX D) PDF