Public-key encryption was developed in the late ________.

A. 1950s B. 1970s

C. 1960s D. 1980s

B. 1970s

Computer Science & Information Technology

You might also like to view...

Credentials that are checked against the database require that the user attempting to access the system has a local ____ account therein.

A. system B. database C. network D. operating system

Computer Science & Information Technology

Windows 10 allows you to search for specific kinds of files.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology