When a digitally signed document is received, the recipient's device uses the sender's ____ key to verify the digital signature.

A. private
B. organizational
C. public
D. token


Answer: C

Computer Science & Information Technology

You might also like to view...

The_______ tier maintains data for the application.

a) bottom. b) server. c) middle. d) Both b and c.

Computer Science & Information Technology

Explain the difference between a multicast and a broadcast.

What will be an ideal response?

Computer Science & Information Technology

One way to access the Table Options menu is to use:

A) the Table icon within the Review tab when selecting a part of the table. B) the Table icon within the References tab when selecting a part of the table. C) the right mouse button when pointing the mouse at a part of the table. D) the right mouse button regardless of what is selected in the document.

Computer Science & Information Technology

The general expression (*pointer).member can always be replaced with the notation ____.

A. *(pointer.member) B. *(pointer->member) C. pointer->member D. member->pointer

Computer Science & Information Technology