If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?
A. Alice's private key
B. Bob's public key
C. Alice's public key
D. Bob's private key
C. Alice's public key
You might also like to view...
The ________ Analyzer tool evaluates each object in the database and suggests ways to make the database more efficient
Fill in the blank(s) with correct word
The ____ task pane provides access to information typically found in references such as dictionaries, thesauruses, and encyclopedias.
A. Research B. Resource C. Library D. Reference
You can add a ____ to an image to change how pixels in the selected layer blend with pixels in the same location in the layer just below it
a. smart filter b. blending mode c. dock d. color gamut
The set of moral principles that govern people's behavior is called ____.
A. plagarism B. ethics C. fair use doctrine D. public domain