omputer networks depend on small packets of data known as _____ to encrypt and protect data.

(1 point)
Responses

private keys

private keys

public keys

public keys

outside keys

outside keys

internal keys

internal keys

public keys