Author Question: ________ is the process of encoding e-mail so that only the person with a corresponding key can ... (Read 71 times)

madam-professor

  • Hero Member
  • *****
  • Posts: 584
________ is the process of encoding e-mail so that only the person with a corresponding key can decode and read the message.
 
  Fill in the blank(s) with correct word

Question 2

To select random (non-contiguous) files in a group, hold down the ________ key.
 
  Fill in the blank(s) with correct word


fffftttt

  • Sr. Member
  • ****
  • Posts: 322
Answer to Question 1

Encryption, Private-key encryption, or Public-key encryption

Answer to Question 2

Ctrl or Control



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

The use of salicylates dates back 2,500 years to Hippocrates’s recommendation of willow bark (from which a salicylate is derived) as an aid to the pains of childbirth. However, overdosage of salicylates can harm body fluids, electrolytes, the CNS, the GI tract, the ears, the lungs, the blood, the liver, and the kidneys and cause coma or death.

Did you know?

Many of the drugs used by neuroscientists are derived from toxic plants and venomous animals (such as snakes, spiders, snails, and puffer fish).

Did you know?

The newest statin drug, rosuvastatin, has been called a superstatin because it appears to reduce LDL cholesterol to a greater degree than the other approved statin drugs.

Did you know?

Studies show that systolic blood pressure can be significantly lowered by taking statins. In fact, the higher the patient's baseline blood pressure, the greater the effect of statins on his or her blood pressure.

Did you know?

Never take aspirin without food because it is likely to irritate your stomach. Never give aspirin to children under age 12. Overdoses of aspirin have the potential to cause deafness.

For a complete list of videos, visit our video library