In ____ encryption, the private key is kept private, in the hands of a single individual.

A. asymmetric
B. symmetric
C. private key
D. shared secret


Answer: A

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 1-2As you prepare your first lecture as the new instructor of the introductory Flash class at the local community college, you take a minute to reintroduce yourself to the basics, which you know will be all-new to your students this evening. What is the best definition of the Property inspector you can provide to students?

A. It provides easy access to the most common attributes of the currently selected tool or object. B. It is used to place objects that are not part of the viewable Stage. C. It is the best way to create new objects in Flash. D. It is used to control the layers and frames that make up an animation.

Computer Science & Information Technology

Which of the following is the name of the file that is contains a two-column table used to mark words as indexed entries?

A) index B) master C) concordance D) XE

Computer Science & Information Technology

When Excel guesses which word you want to type after you enter the first letter, you are experiencing a feature known as AutoComplete.  _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Software artifacts are:

A. Code B. Documentation C. Contracts D. All of the above

Computer Science & Information Technology