Which type of key is used if both the sender and the receiver use the same key to encrypt and decrypt messages?
A) private B) public C) symmetric D) cipher
C
Computer Science & Information Technology
You might also like to view...
The ____ method returns the Boolean value True if the file exists; otherwise, it returns the Boolean value False.
A. IsThere B. CanFind C. DoesExist D. Exists
Computer Science & Information Technology
The spacing between tick marks is determined by the ________
A) base value B) rate of increase C) Major unit value D) data marker
Computer Science & Information Technology
A(n) __________ is a document containing contact information of the individuals to notify in the event of an actual incident.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
If you already have images saved in your website that you would like to insert in a table, you can drag them from the ____________________ panel into the table cells.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology