____ key cryptography uses a single key to both encrypt and decrypt the document.

A. User
B. Private
C. Public
D. Known

Answer: B

Computer Science & Information Technology

You might also like to view...

In Windows 7, virtualized folders shared by default with other users of the computer are also called __________

a. Libraries b. Shares c. Encrypted folders d. Private folders

Computer Science & Information Technology

What do the last 64 bits of a global unicast address look like?

What will be an ideal response?

Computer Science & Information Technology