Public key cryptography is so-named because:

a. It is highly popular
b. Its use is not restricted by patents
c. It utilizes an open source encryption algorithm
d. The key that is used to encrypt a message does not need to be kept a secret, but can be made public


d. The key that is used to encrypt a message does not need to be kept a secret, but can be made public

Computer Science & Information Technology

You might also like to view...

A general rule of thumb regarding file headers is that a humanly readable file has a humanly readable header

a. True b. False

Computer Science & Information Technology

In the default setting of Excel. Assume that the cell A1 has value a and the cell A2 has value c. If we select A1:A2 and drag the fill handle down to the cell A5. What is the value of cell A5?

Choose one answer. a. i b. a c. None of the others d. c

Computer Science & Information Technology

When troubleshooting a failed backup, a technician runs the backup using the same tape but on a different tape drive in the same tape library. The backup fails again. Which of the following should be the FIRST item the technician should examine as a failure?

A. Tape drive B. Tape library C. Tape media D. Tape capacity

Computer Science & Information Technology

If you have not selected a 3D object on the _______________, the 3D panel displays tools to create one.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology