Pretty good privacy program is used for
(a) Electronic mails
(b) File encryption
(c) Electronic mails & File encryption
(d) None of the mentioned
I have been asked this question in an online interview.
I want to ask this question from Public Key Cryptosystems in chapter Encryption and Decryption of Digital Communications