The most widely used public-key cryptosystem is __________ .

A. optimal asymmetric encryption
B. asymmetric encryption
C. RSA
D. DES


C. RSA

Computer Science & Information Technology

You might also like to view...

The following statement __________

``` int *ptr = new int; ``` a. results in a compiler error b. assigns an integer less than 32767 to the variable ptr c. assigns an address to the variable ptr d. creates a new pointer named int e. None of these

Computer Science & Information Technology

ClipArt is a collection of graphical templates that can be used to depict organizational charts and processes.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A _____________ allows multiple lines of text to be displayed.

(a) JTextField (b) JTextArea (c) JTextBox (d) JTextValue

Computer Science & Information Technology

Analyze the following code:

``` public class Test { public static void main(String[] args) { B b = new B(); b.m(5); System.out.println("i is " + b.i); } } class A { int i; public void m(int i) { this.i = i; } } class B extends A { public void m(String s) { } } ``` a. The program has a compile error, because m is overridden with a different signature in B. b. The program has a compile error, because b.m(5) cannot be invoked since the method m(int) is hidden in B. c. The program has a runtime error on b.i, because i is not accessible from b. d. The method m is not overridden in B. B inherits the method m from A and defines an overloaded method m in B.

Computer Science & Information Technology