Answer:
Nancy's private key
Explanation:
She's receiving it. That means Matthew used her public key to encrypt it. She should decrypt it using her private key. Watch this video for clarification :)
Watch The Internet: Encryption & Public Keys on the big video site which cannot be named on brainly :p
Answer:
import java.util.Scanner;
public class TestClock {
public static void main(String[] args) {
Scanner in = new Scanner (System.in);
System.out.print("Enter favorite color:");
String word1 = in.next();
System.out.print("Enter pet's name:");
String word2 = in.next();
System.out.print("Enter a number:");
int num = in.nextInt();
System.out.println("you entered: "+word1+" "+word2+" "+num);
}
}
Explanation:
Using Java Programming language
- Import the Scanner class
- create an object of the scanner class
- Prompt user to enter the values for the variables (word1, word2, num)
- Use String concatenation in System.out.println to display the output as required by the question.
Answer:
1. Classes and objects
2. Inheritance
3. Polymorphism
4. Data hiding/ encapsulation
5. Interfaces.
Explanation:
Classes and objects depict the major component of the OOP (object oriented programming). It explains the object like a ball in a soccer game development.
The inheritance is like the subclass of the object. Data hiding is a stage in oop where the codes or data are hidden from another users.
In the polymorphism stage, the object is given the ability to change to a sub-object, while in the interface stage a function or method signature is defined without implementing it.