False, there is a variety
Employee medical records are one of the right to know rule
DH is an algorithm to derive a shared secret over an unsafe channel.
Both parties exchange public keys, and can join them together with their private keys to create the secret. An eavesdropper can see both public keys, but since he doesn't posess the private keys, cannot derive the same secret.
The secret can be used to subsequently encrypt communications with a symmetric algorithm.
TLS uses this approach.
Answer:
Centralized Processing
Explanation:
Centralized processing was developed to process all of the data in a single computer, and since the first computers were stand-alone with all input and output devices in the same room, only the largest organizations could afford to use centralized processing.