The process of reversing public key encryption to verify that a message was sent by a specific sender and thus cannot be refuted is known as __________.
Fill in the blank(s) with the appropriate word(s).
digital signature
Computer Science & Information Technology
You might also like to view...
Which of the following actions will deselect a group of selected files?
A) click in a blank area of the screen B) minimize the window C) drag a box around the selected files D) press Esc
Computer Science & Information Technology
All of the following statements are TRUE regarding PivotCharts EXCEPT:
A) Once a PivotChart is created, all formatting elements from a regular chart are no longer available. B) When the PivotTable data are rearranged, they are automatically updated in the PivotChart. C) When making changes to the PivotChart the corresponding changes are seen in the PivotTable. D) PivotCharts provide a visual representation of the data in a PivotTable.
Computer Science & Information Technology