________ keys are secret keys that are used for the duration of that transaction.
a) Private.
b) Session.
c) Duration.
d) None of the above.
b) Session.
Computer Science & Information Technology
You might also like to view...
The ________ field property is the label that displays in datasheets, forms, and reports
A) Criteria B) Key C) Description D) Caption
Computer Science & Information Technology
A ____ wavy underline indicates the text may contain a contextual spelling error such as the misuse of homophones.
A. red B. green C. blue D. purple
Computer Science & Information Technology