Computer networks depend on small pockets of data known as ______ to encrypt and protect data.

A. private keys
B. public keys
C. outside keys
D. internal keys

A. private keys