The __________ is the encryption algorithm run in reverse.
A. decryption algorithm B. plaintext
C. ciphertext D. encryption algorithm
A. decryption algorithm
Computer Science & Information Technology
You might also like to view...
To insert a column chart, click the Column button located on the ________ tab
A) Insert B) Chart C) Edit D) Data
Computer Science & Information Technology
The command-line method for creating users in Linux allows information to be imported from a text file.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology