Public-key encryption was developed in the late ________.
A. 1950s B. 1970s
C. 1960s D. 1980s
B. 1970s
Computer Science & Information Technology
You might also like to view...
Credentials that are checked against the database require that the user attempting to access the system has a local ____ account therein.
A. system B. database C. network D. operating system
Computer Science & Information Technology
Windows 10 allows you to search for specific kinds of files.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology