Asymmetric encryption can be used for __________ .
A. both confidentiality and authentication
B. neither confidentiality nor authentication
C. confidentiality
D. authentication
A. both confidentiality and authentication
Computer Science & Information Technology
You might also like to view...
Match each term with its correct description.
A. Shows statistics on groups of records B. Prompts the user for criteria to select records for a report C. Changes the way a control looks on a form or report based on criteria you specify D. Copies formatting properties from one control to another E. Predefined format that you can apply to all objects in the database
Computer Science & Information Technology
Differentiate stepwise refinement from software refactoring.
What will be an ideal response?
Computer Science & Information Technology