<span>
<span>b)
</span>Symmetric Cryptography
<span>
<span>c)
</span>Algorithm
<span>
<span>d)
</span>Digital signature
The answer is (D) Digital Signature
It uses the private key of a sender and is a mathematical
technique that validates the integrity and authenticity through a public key
encryption of a digital or a software document. It is normally attached to digital
or a software document to verify the sender’s identity and its content.
</span></span></span>
<span>The term digital signature is used to describe a public-key, cryptography-based mechanism for proving the source (and possibly integrity) of a dataset or message. </span>Digital signature enables authentication which means that the receiver knows that <span> the message was created by a known sender </span>
Primary storage. Primary storage (also known as main memory, internal memory, or prime memory), often referred to simply as memory, is the only one directly accessible to the CPU.