In ____ encryption, the private key is kept private, in the hands of a single individual.
A. asymmetric
B. symmetric
C. private key
D. shared secret
Answer: A
You might also like to view...
Case-Based Critical Thinking QuestionsCase 1-2As you prepare your first lecture as the new instructor of the introductory Flash class at the local community college, you take a minute to reintroduce yourself to the basics, which you know will be all-new to your students this evening. What is the best definition of the Property inspector you can provide to students?
A. It provides easy access to the most common attributes of the currently selected tool or object. B. It is used to place objects that are not part of the viewable Stage. C. It is the best way to create new objects in Flash. D. It is used to control the layers and frames that make up an animation.
Which of the following is the name of the file that is contains a two-column table used to mark words as indexed entries?
A) index B) master C) concordance D) XE
When Excel guesses which word you want to type after you enter the first letter, you are experiencing a feature known as AutoComplete. _________________________
Answer the following statement true (T) or false (F)
Software artifacts are:
A. Code B. Documentation C. Contracts D. All of the above