Barry recently received a message from Melody that Melody encrypted using symmetric cryptography. What key should Barry use to decrypt the message?
A. Barry's public key
B. Barry's private key
C. Melody's public key
D. Shared secret key
Answer: D. Shared secret key
Computer Science & Information Technology
You might also like to view...
To remove a table's functions, you can convert it to a(n) ________
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Answer the following statements true (T) or false (F)
1. Computer games are a type of application software. 2. Scripting language code is embedded into an HTML document. 3. A programming language is a compiled language but a scripting language is not compiled before it is run. 4. Assembly language consists of a sequence of bits that are all zeros and ones. 5. PHP and ASP are dynamic programming languages that require the use of a debugger and an editor.
Computer Science & Information Technology