Which type of key is used if both the sender and the receiver use the same key to encrypt and decrypt messages?

A) private B) public C) symmetric D) cipher


C

Computer Science & Information Technology

You might also like to view...

The ____ method returns the Boolean value True if the file exists; otherwise, it returns the Boolean value False.

A. IsThere B. CanFind C. DoesExist D. Exists

Computer Science & Information Technology

The spacing between tick marks is determined by the ________

A) base value B) rate of increase C) Major unit value D) data marker

Computer Science & Information Technology

A(n) __________ is a document containing contact information of the individuals to notify in the event of an actual incident.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

If you already have images saved in your website that you would like to insert in a table, you can drag them from the ____________________ panel into the table cells.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology