A widely used encryption algorithm is

a. PGP
b. RSA
c. CRC
d. DTR

b. RSA

Computer Science & Information Technology

You might also like to view...

An insertion anomaly suggests that you enter data about two different entities when you have data on only one entity

Indicate whether the statement is true or false

Computer Science & Information Technology

A RADIUS proxy can be placed between Network Access Servers and NPS servers to manage the load on NPS servers.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology