Information encrypted with the creator's private key that is used to authenticate the sender is called

A) asymmetric encryption.
B) digital certificate.
C) digital signature.
D) public key.

Answer: C

Business

You might also like to view...

Which of the following has been suggested by industry observers as a major problem associated with respondents failing to participate in surveys?

A) fear of invasion of privacy B) skepticism regarding the benefits of participating in research C) research as a guise for telemarketing (Sugging and Frugging) D) all of the above have been suggested by industry observers E) none of the above have been suggested by industry observers

Business

According to Table 11-3, there are five activities in a PERT project. Which activities are on the critical path?

A) A-B-C-D-E B) A-C-E C) B-D D) A-B-C-D E) B-E

Business