With ______________ encryption, one key is used to encrypt a message, and another is used to decrypt the message
a. Private key
b. Public key
c. Cipher
d. None of the above
Answer B. You can freely distribute your public key so that anyone can encrypt a message sent to you, but only you have the private key and only you can decrypt the message.
You might also like to view...
If Americans are objects of the same class, which of the following attributes would most likely be represented by a static variable of that class?
a. Age. b. The President. c. Place of birth. d. Favorite food.
In addition to adjusting magnification on the Stage using the View list arrow in the Document window, you can use the ____________________ Tool.
Fill in the blank(s) with the appropriate word(s).
Function call overhead is justified because it can reduce a program's ____________________ substantially.
Fill in the blank(s) with the appropriate word(s).
In a data dictionary, _____ refers to whether the data element contains numeric, alphabetic, or character values.
A. pool B. type C. valence D. domain