1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prisoha [69]
4 years ago
11

If userA wants to send a secure message to userB using an asymmetric cryptographic algorithm, which key does userB use to decryp

t the message?
Computers and Technology
1 answer:
ANTONII [103]4 years ago
4 0

Answer:

userB will use his/her private key.

Explanation:

The steps involved in using asymmetric cryptographic algorithm are as follow:

1. Each user generates a pair of keys to be used for the encryption and decryption of messages.

2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.

3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.

4. When UserB receives the message, she decrypts it using her private key.

You might be interested in
What do we call the input and output devices that are connected externally to the computer?
Anna35 [415]

Explanation:

computer peripheral is an external device that provides input and output for the computer. for example keyboard and mouse are input peripherals while mouse and printer are output peripherals...

5 0
3 years ago
Read 2 more answers
Frank is preparing a subsection of the SRS document that specifies data formats, data integrity, and storage capabilities. Which
Flauer [41]

The subsection which Frank is preparing for the SRS document that specifies data formats, data integrity, and storage capabilities is Logical Database Requirements.

<h3>What is SRS document?</h3>

SRS document of the software requirement specification document is the document which describes the function of a software and its procedure to perform a particular function.

Different types of requirement-

  • A. External Interface Requirements- This includes the interface of used, such as layout of screen, button etc.
  • B. Design Constraints- This includes the subcomponent of the system, such as performance requirement.
  • C. Inverse Requirements- It defines that what a system can not do.
  • D. Logical Database Requirements- Data of the user are saved in this such as profile, massage,data formats, data integrity, and storage capabilities etc.
  • E. Non-Functional Requirements-This includes attributes of system, performance, security etc.

Frank is preparing a subsection of the SRS document that specifies data formats, data integrity, and storage capabilities.

Thus, the subsection which Frank is preparing for the SRS document that specifies data formats, data integrity, and storage capabilities is Logical Database Requirements.

Learn more about the SRS document here:

brainly.com/question/26161636

#SPJ1

4 0
3 years ago
( Game Design) The companies who get video games out to consumers are called:
Bad White [126]

Answer:

They are called video game publishers

Explanation:

A video game publisher is responsible for financing a video game’s development, marketing, and release of the game to the consumers. Basically, they are the ones who manage the business end of the gaming field. If the video game company is well established, the publishers of that company will be the ones to distribute while some smaller companies will hire distribution companies to distribute the games for them

3 0
3 years ago
Using above information, Write a prolog program to answer the following queries. Please note that you cannot simply answer these
vampirchik [111]

Using the computational knowledge in python it is possible to write a code that uses the functions to make a  a prolog program to answer the following queries

<h3>Writting the code in python:</h3>

<em>valid([]).</em>

<em>valid([Head|Tail]) :-</em>

<em>fd_all_different(Head),</em>

<em>valid(Tail).</em>

<em />

<em>sudoku(Puzzle, Solution) :-</em>

<em>Solution = Puzzle,</em>

<em>Puzzle = [S11, S12, S13, S14,</em>

<em>S21, S22, S23, S24,</em>

<em>S31, S32, S33, S34,</em>

<em>S41, S42, S43, S44],</em>

<em />

<em>fd_domain(Solution, 1, 4),</em>

<em />

<em>Row1 = [S11, S12, S13, S14],</em>

<em>Row2 = [S21, S22, S23, S24],</em>

<em>Row3 = [S31, S32, S33, S34],</em>

<em>Row4 = [S41, S42, S43, S44],</em>

<em />

<em>Col1 = [S11, S21, S31, S41],</em>

<em>Col2 = [S12, S22, S32, S42],</em>

<em>Col3 = [S13, S23, S33, S43],</em>

<em>Col4 = [S14, S24, S34, S44],</em>

<em />

<em>Square1 = [S11, S12, S21, S22],</em>

<em>Square2 = [S13, S14, S23, S24],</em>

<em>Square3 = [S31, S32, S41, S42],</em>

<em>Square4 = [S33, S34, S43, S44],</em>

<em />

<em>valid([Row1, Row2, Row3, Row4,</em>

<em>Col1, Col2, Col3, Col4,</em>

<em>Square1, Square2, Square3, Square4]).</em>

<em />

<em>| ?- sudoku([_, 4, 3, 2,</em>

<em>3, _, _, _,</em>

<em>4, 1, _, _,</em>

<em>_, _, 4, 1],</em>

<em>Solution).</em>

<em>Solution = [1,4,3,2,3,2,1,4,4,1,2,3,2,3,4,1]</em>

<em>yes</em>

See more about python at brainly.com/question/18502436

#SPJ1

7 0
2 years ago
If a user has one column in a table and would like to make it into two columns, which command should be used?
Vesna [10]
Split cells.

This answer needs to be twenty characters long to qualify so here is this useless sentence.
4 0
4 years ago
Other questions:
  • Can some one please help The term career is usually applied to a what PLEASEEEEEEEEEEEE HEEEEELLLLLPPPPP MEEEEEE
    7·1 answer
  • Write a C++ function, lastLargestIndex that takes as parameters an int array and its size and returns the index of the last occu
    10·1 answer
  • A network administrator receives a call from the sales department requesting ports 20 and 21 be opened on the company’s firewall
    12·1 answer
  • Within the Differentiated Services (DiffServ) architecture, how many classes of service (CoS) are there?
    7·1 answer
  • Mike's boss told him he needs to be more efficient. Select each suggestion that will help him become more efficient at creating
    9·1 answer
  • What information should the subtitles in the clips of your video per folio provide?
    14·1 answer
  • Multitasking systems _____.
    8·1 answer
  • Apply Decision Tree Algorithm on the following data:
    12·1 answer
  • Which of the following is not a secondary memory. (a) pen drive (b) Hard disk (c) Ram (d) Magnetic disk
    8·1 answer
  • Fill in the blank to complete the sentence.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!