Which of the following is used to associate a public key with an identity?
A) Encryption
B) Digital hash
C) Digital certificate
D) Digital signature
C) Digital certificate
You might also like to view...
Which statement is false:
a. A weak_ptr points to the resource managed by a shared_ptr without assuming any responsibility for it. b. The reference count for a shared_ptr doesn’t increase when a weak_ptr references it. That means that the resource of a shared_ptr can be deleted while there are still weak_ptrs pointing to it. When the last shared_ptr is destroyed, the resource is deleted and any remaining weak_ptrs are set to NULL. c. One use for weak_ptr s is to avoid memory leaks caused by circular references. d. None of the above.
Methods that operate on an object's fields are called __________.
a. instance variables b. instance methods c. public methods d. private methods