A widely used encryption algorithm is
a. PGP
b. RSA
c. CRC
d. DTR
b. RSA
Computer Science & Information Technology
You might also like to view...
An insertion anomaly suggests that you enter data about two different entities when you have data on only one entity
Indicate whether the statement is true or false
Computer Science & Information Technology
A RADIUS proxy can be placed between Network Access Servers and NPS servers to manage the load on NPS servers.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology