The __________ is the encryption algorithm run in reverse.

A. decryption algorithm B. plaintext

C. ciphertext D. encryption algorithm

A. decryption algorithm

Computer Science & Information Technology

You might also like to view...

To insert a column chart, click the Column button located on the ________ tab

A) Insert B) Chart C) Edit D) Data

Computer Science & Information Technology

The command-line method for creating users in Linux allows information to be imported from a text file.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology