单选

In the following essay, each blank has four choices. Choose the most suitable one from the four choices and write down in the answer sheet. There are two types of key technology: private key and public key. Private-key encryption methods are called(71)ciphers, information is encrypted with(72)both the sender and receiver hold privately. Public-key encryption methods are called(73)ciphers,(74)created for each user, encryption key and deception key are(75)

  • A.synchronous
  • B.Asynchronous
  • C.symmetric
  • D.asymmetric
参考答案
您可能感兴趣的试题

(86)

  • A.same
  • B.different
  • C.difference
  • D.some

(84)

  • A.synchronous
  • B.Asynchronous
  • C.symmetric
  • D.asymmetric

(85)

  • A.two related keys are
  • B.a key is
  • C.two unrelated keys are
  • D.three keys are

(83)

  • A.a key
  • B.two keys
  • C.three keys
  • D.four keys

(81)

  • A.in general
  • B.in any term
  • C.in set terms
  • D.in terms of

(80)

  • A.faced on
  • B.faced with
  • C.faced about
  • D.faced up to

(79)

  • A.consolidates
  • B.consists
  • C.considerate
  • D.consoles

(78)

  • A.same
  • B.similar
  • C.different
  • D.difference
¥

订单号:

遇到问题请联系在线客服

订单号:

遇到问题请联系在线客服