Barry recently received a message from Melody that Melody encrypted using symmetric cryptography. What key should Barry use to decrypt the message?

A. Barry's public key
B. Barry's private key
C. Melody's public key
D. Shared secret key

Answer: D. Shared secret key

Computer Science & Information Technology

You might also like to view...

To remove a table's functions, you can convert it to a(n) ________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. Computer games are a type of application software. 2. Scripting language code is embedded into an HTML document. 3. A programming language is a compiled language but a scripting language is not compiled before it is run. 4. Assembly language consists of a sequence of bits that are all zeros and ones. 5. PHP and ASP are dynamic programming languages that require the use of a debugger and an editor.

Computer Science & Information Technology