Answer:
In sub procedure or normal program?
Answer:
yes
Explanation:
If it is guranteed the key is only known to Alice and Bob and there is no risk of man in the middle attack or channel spoofing so we can achieve data origin authentication
This seems like more of an opinion based question, but since they added "over a longer distance" If I were you I would go with false.
Answer:
Java
Explanation:
Java is a general-purpose programming language that is object-oriented, and has strong support for web development.
Therefore, one of the languages that a college sophomore majoring computer science learn is <u>Java,</u> an object-oriented programming language that is commonly used to write Web applications.