In public-key encryption, the two keys, one for coding and one for decoding, are known as ________.

A. code keys
B. linked keys
C. key tags
D. a key pair

Answer: D

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 1Giovanni is teaching his introductory computer science students about types of errors. He likes to provide them with examples of each type of error to reinforce the definitions. One of Giovanni’s students named a control perfectly, except that he failed to use an exclamation point to separate each part of the name from the other. What kind of error did he commit?

A. logic B. run-time C. syntax D. macro

Computer Science & Information Technology

Case EX 4-2Ben is copying some formulas and wants to make sure he has the cell references correct.Ben wants to copy a formula that is the sum of five rows.  He wants the formula to change as he copies it so that it shows the sum of five rows for each column.  What type of cell reference should Ben use?

A. Absolute B. Relative C. Mixed D. None of the above

Computer Science & Information Technology