Computer networks depend on small pockets of data known as ______ to encrypt and protect data.
A. private keys
B. public keys
C. outside keys
D. internal keys
1 answer
A. private keys
A. private keys
B. public keys
C. outside keys
D. internal keys
1 answer