________ keys are secret keys that are used for the duration of that transaction.

a) Private.
b) Session.
c) Duration.
d) None of the above.

b) Session.

Computer Science & Information Technology

You might also like to view...

The ________ field property is the label that displays in datasheets, forms, and reports

A) Criteria B) Key C) Description D) Caption

Computer Science & Information Technology

A ____ wavy underline indicates the text may contain a contextual spelling error such as the misuse of homophones.

A. red B. green C. blue D. purple

Computer Science & Information Technology