Public key cryptography uses which of the following?

A) A shared key
B) A public key
C) A private key
D) Both a public and a private key


D) Both a public and a private key

Computer Science & Information Technology

You might also like to view...

________ define the kind of data that can be entered into a field, such as numbers, text, or dates

A) Field names B) Description C) Data types D) Field properties

Computer Science & Information Technology

Selecting an object and then pressing the ________ key and selecting additional objects, allows you to group all objects together

A) F1 B) Alt C) Shift D) F12

Computer Science & Information Technology

You can double-click a behavior in the Behaviors panel to open the behavior's dialog box.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Choose the correct verb to agree in number with the subject of the following sentence.? Neither Opal nor Elise __________ to share an apartment.

A. ?want B. ?wants

Computer Science & Information Technology