When one key is used to encrypt data another other key is used to decrypt it, the method is called ____________________ encryption.

Fill in the blank(s) with the appropriate word(s).


asymmetric

Computer Science & Information Technology

You might also like to view...

When you embed an Excel worksheet into a Word document, it becomes part of the Word document

Indicate whether the statement is true or false

Computer Science & Information Technology

On a touch display, you can zoom out using the Pinch gesture

Indicate whether the statement is true or false.

Computer Science & Information Technology

The disaster recovery team will ________ the disaster recovery planning team

A) not be the same as B) not be as informed as C) oversee D) always be the same as

Computer Science & Information Technology

Out of the box, a managed switch has a preset _______________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology