Which of the following are possible using public key systems?
a. digital signatures
b. digital postmarks
c. digital certificates
d. all of the above
d. all of the above
Computer Science & Information Technology
You might also like to view...
The mode of opening an Access database that prevents others from opening it while you are working with it is called _________ mode
Fill in the blank(s) with correct word
Computer Science & Information Technology
After you remove borders from a table, you can still view nonprinting gridlines, which show the cell ________ of a table whenever the table does not have borders applied
Fill in the blank(s) with correct word
Computer Science & Information Technology