Top Posters
Since Sunday
5
a
5
k
5
c
5
B
5
l
5
C
4
s
4
a
4
t
4
i
4
r
4
New Topic  
blue_nose blue_nose
wrote...
Posts: 4020
9 years ago
When using ________-key encryption, only the message sender and recipient have the code.
Textbook 
Technology In Action Complete

Technology In Action Complete


Edition: 12th
Authors:
Read 228 times
3 Replies
Replies
Answer verified by a subject expert
popspops
wrote...
Top Poster
Posts: 4451
9 years ago
Sign in or Sign up in seconds to unlock everything for free
More solutions for this book are available here
1

Related Topics

blue_nose Author
wrote...
9 years ago
Which confirms my gut feeling, I picked your answer and it turned up right! Grinning Face
wrote...
9 years ago
I was right? I actually guessed ha ha! Thanks for the update.
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  1213 People Browsing
Related Images
  
 283
  
 281
  
 355
Your Opinion
Which is the best fuel for late night cramming?
Votes: 145