Answer B: Asymmetric cryptography, because the receiver has its own decryption key and cannot create encrypted messages, because he doesn't have the encryption key.
About the other answers:
A: Private keys are always involved, there has to be some secret to do encryption, so this answer doesn't say very much.
C: Digital signatures can be used to verify/prove some data comes from some person (the signer) in an unaltered way. It is not about encryption, so is not about the security of your message. You use it in combination with encryption.
D: Like A, this doesn't say very much. Shared secret keys (symmetric keys) can be used for encryption, but they are less secure since the keys have to exist in more than one place (sender and receiver).
That's true for a few days out of a month ... a day or two before and after each New Moon. When it does actually get DIRECTLY between, that's when we get a solar eclipse.
Answer:
A. Back up software - Utility software
B. Printer - Device drivers
C. Camera - Firmware
D. Television - Firmware
E. Games console - Firmware
F. Antivirus software - Utility software
G. Disk Cleaner - Utility software
H. Video Card - Device drivers
Explanation:
Computer system components are the physical or hardware and software parts of the device. It is a combination of system software like utility software, device drivers and firmware, application software, and the hardware components and kernel.
Hi Pupil Here's Your Answer ::
➡➡➡➡➡➡➡➡➡➡➡➡➡
Application software and software that are created to facilitate/perform a specific type of real life application directly for the end user. These are available in the market as single readymade software or as an integrated package like MS Office, Visual Studio or Adobe integrated suite.
There are three types of application software which you would know about ::
# General Purpose Application Software.
# Special Purpose Application Software.
# Customized or Bespoke Purpose Application Software.
⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅⬅
Hope this helps .........