The __________ uses an algorithm that is designed to provide only the digital signature function and cannot be used for encryption or key exchange.
A. ECC B. RSA
C. DSS D. XOR
C. DSS
Computer Science & Information Technology
You might also like to view...
Which of the following is NOT a method of controlling the Access user interface?
A) Controlling if the Ribbon will be visible B) Controlling the way users navigate to the database C) Setting a password on the database D) Preventing users from editing certain Access objects
Computer Science & Information Technology
The command to insert an online video into a document is located in the Media group of the Insert tab
Indicate whether the statement is true or false
Computer Science & Information Technology