____ key cryptography uses a single key to both encrypt and decrypt the document.
A. User
B. Private
C. Public
D. Known
Answer: B
Computer Science & Information Technology
You might also like to view...
In Windows 7, virtualized folders shared by default with other users of the computer are also called __________
a. Libraries b. Shares c. Encrypted folders d. Private folders
Computer Science & Information Technology
What do the last 64 bits of a global unicast address look like?
What will be an ideal response?
Computer Science & Information Technology