A public key or the asymmetric key which is used for the authentication process. It consists of a pair of keys in which one key encrypts and the other decrypts. It come under Public Key Infrastructure (PKI) and is a part of INFORMATION SECURITY measures. PKI is the management solution for the keys.
deep blue IBM's chess-playing computer
Because then the line is proper as opposed to if the line is improper. If the line is improper, then it has no manners and you can't invite it to dinner with your family because it will be rude and your mother would be offended.