The __________ is formed by taking the hash of the message and encrypting the message with the creator's private key.

A. timestamp
B. message digest
C. hash code
D. digital signature


D. digital signature

Computer Science & Information Technology

You might also like to view...

After reading the specifications for a project, a good programmer should put together a set of questions for the person who provided the specifications.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

How to specify cell range from A9 to A99 in Excel? Select one:

a. (A9, A99) b. (A9 : A99) c. (A9 to A99) d. (A9 - A99)

Computer Science & Information Technology

Which of the following statements throws a valid exception in C++?

A. throw.function(); B. throw 2; C. throws str; D. 4 throw;

Computer Science & Information Technology

Which of the following connectors from a power supply should be used with a graphics expansion card?

A. 8-pin 12 volt B. PCIe 6-pin C. 20-pin D. SATA

Computer Science & Information Technology