When a user utilizes a(n) ____________ key, a message is scrambled by applying a secret code.

0 votes
   
      firewall
      encryption
      surge
      access
asked May 20, 2013 in Computer Science by anonymous
    

1 Answer

0 votes
encryption
answered May 21, 2013 by CS ~Top Expert~ (7,590 points)



...