Which of the following uses the same key to encrypt and decrypt the data?
a. Symmetric encryption
b. Asymmetric encryption
c. Encryption
d. Cryptographic key
ANS: A
Computer Science & Information Technology
You might also like to view...
A common use of the type of list shown in the accompanying figure is to create a(n) ____________________, which is a list of events in time order.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
A ________ is responsible for the development of computer software.
A. database administrator B. network administrator C. software engineer D. computer support specialist
Computer Science & Information Technology