一起答
单选

公开密钥方法的主要优点之一是(46)。RSA算法的基础是(47)。当N个用户采用公开密钥方法保密通信时,系统中一共有(48)个密钥,每个用户要小心保管好(49)个密钥。为了防止不者实用户否认他们曾经通过计算机发送过文件,较简便的方法是利用公开密钥方法完成(50)。

  • A.所有密钥公开
  • B.加密解密计算方便
  • C.便于密钥的传送
  • D.易于用硬件实现
参考答案
查看试卷详情
相关试题
  1. (120)

    • A.control
    • B.inheritance
    • C.inference
    • D.connection
  2. (118)

    • A.mark
    • B.picture
    • C.symbol
    • D.notation
  3. (119)

    • A.instance
    • B.example
    • C.existence
    • D.implementation
  4. (117)

    • A.problem
    • B.solution
    • C.data
    • D.program
  5. (115)

    • A.assignment
    • B.design
    • C.value
    • D.dispatch
  6. Traditional structured analysis techniques focus upon the flow of(71)within a system. Object - oriented analysis emphasizes the building of real - world models. It examines requirements from the perspective of the classes and objects found in the vocabulary of the(72)domain.

    Traditional system design method emphasizes the proper and effective structure of a complex system. Object -oriented design method encompasses the process of object -oriented decomposition and a(73)for depicting both logical and physical as well as static and dynamic models of the system under design.

    Object - oriented programming is a method of implementation in which programs are organized as cooperative collections of objects, each of which represents an(74)of some class, and whose classes are all members of a hierarchy of classes united via(75)relationships.

    • A.control
    • B.program
    • C.data
    • D.reference
  7. (114)

    • A.tranverse
    • B.transportation
    • C.transmmision
    • D.translation
  8. (113)

    • A.middle
    • B.intermediate
    • C.previous
    • D.final
  9. (110)

    • A.above
    • B.upon
    • C.against
    • D.with
  10. A typical(66)language contains an applicative sub-language which approximates the mathematical abstractions of "timeless" functions applied to "spaceless" values, where the actual operation sequences and use of storage space during expression evaluation are organized behind the(67). In this setting, values are data structures of low volume, typically a few computer words or less, which means that an illusion of spacelessness can be realized by having(68)results during expression evalution stored at the discretion of the language implementation, and effecting parameter(69)and(70)operations through value copying.

    • A.imperative
    • B.mandatory
    • C.compulsory
    • D.voluntary