The most widely used public-key cryptosystem is __________ .
A. optimal asymmetric encryption
B. asymmetric encryption
C. RSA
D. DES
C. RSA
You might also like to view...
The following statement __________
``` int *ptr = new int; ``` a. results in a compiler error b. assigns an integer less than 32767 to the variable ptr c. assigns an address to the variable ptr d. creates a new pointer named int e. None of these
ClipArt is a collection of graphical templates that can be used to depict organizational charts and processes.
Answer the following statement true (T) or false (F)
A _____________ allows multiple lines of text to be displayed.
(a) JTextField (b) JTextArea (c) JTextBox (d) JTextValue
Analyze the following code:
``` public class Test { public static void main(String[] args) { B b = new B(); b.m(5); System.out.println("i is " + b.i); } } class A { int i; public void m(int i) { this.i = i; } } class B extends A { public void m(String s) { } } ``` a. The program has a compile error, because m is overridden with a different signature in B. b. The program has a compile error, because b.m(5) cannot be invoked since the method m(int) is hidden in B. c. The program has a runtime error on b.i, because i is not accessible from b. d. The method m is not overridden in B. B inherits the method m from A and defines an overloaded method m in B.