When one key is used to encrypt data another other key is used to decrypt it, the method is called ____________________ encryption.
Fill in the blank(s) with the appropriate word(s).
asymmetric
Computer Science & Information Technology
You might also like to view...
When you embed an Excel worksheet into a Word document, it becomes part of the Word document
Indicate whether the statement is true or false
Computer Science & Information Technology
On a touch display, you can zoom out using the Pinch gesture
Indicate whether the statement is true or false.
Computer Science & Information Technology
The disaster recovery team will ________ the disaster recovery planning team
A) not be the same as B) not be as informed as C) oversee D) always be the same as
Computer Science & Information Technology
Out of the box, a managed switch has a preset _______________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology