●In the following essay,each blank has four choices.Choose the most suitable one from the four choices and write down in the answer sheet.There are two types of key technology:private key and public key.Private-key encryption methods are called (66) ciphers,information is encrypted with (67) both the sender and receiver hold privately.Public-key encryption methods are called (68) ciphers, (69) created for each user,encryption key and decryption key ale (70) .
(66) A.synchronous
B.Asynchronous
C.symmetric
D.asymmetric
(67) A.a key
B.two keys
C.three keys
D.four keys
(68) A.synchronous
B.Asynchronous
C.symmetric
D.asymmetric
(69) A.two related keys ale
B.a key is
C.two unrelated keys ale
D.three keys ale
(70) A.same
B.different
C.difference
D.some
相關(guān)推薦:推薦:2010年計算機(jī)軟件水平考試必備完美攻略北京 | 天津 | 上海 | 江蘇 | 山東 |
安徽 | 浙江 | 江西 | 福建 | 深圳 |
廣東 | 河北 | 湖南 | 廣西 | 河南 |
海南 | 湖北 | 四川 | 重慶 | 云南 |
貴州 | 西藏 | 新疆 | 陜西 | 山西 |
寧夏 | 甘肅 | 青海 | 遼寧 | 吉林 |
黑龍江 | 內(nèi)蒙古 |