In which type of encryption is the same key used to encrypt and decrypt data?

A. private
B. public
C. symmetric
D. asymmetric


Answer: C

Computer Science & Information Technology

You might also like to view...

True or false: Physical databases can have redundant data.

a. true b. false c. it depends on the data d. it depends who will be using the data

Computer Science & Information Technology

You cannot change the color of the laser pointer in a custom show.? ____________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What are two important thoughts to keep in mind when considering the reasons to virtualize?A. Two important thoughts to keep in mind when considering the reasons to virtualize are:•          First, a single hypervisor on a single system will happily run as many virtual machines as its RAM, CPU, and drive space allow. (RAM is almost always the limiting factor.)•          Second, a virtual machine that's shut down or suspended is no more than a file or folder sitting on a hard drive.

What will be an ideal response?

Computer Science & Information Technology

Local variables ____.

A. are defined inside Main( ) and other methods B. must be defined as private C. are defined in classes D. determine the data characteristics for the class

Computer Science & Information Technology