Answer:
userB will use his/her private key.
Explanation:
The steps involved in using asymmetric cryptographic algorithm are as follow:
1. Each user generates a pair of keys to be used for the encryption and decryption of messages.
2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.
3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.
4. When UserB receives the message, she decrypts it using her private key.
Answer:
<u>First generation are</u>
a)they are unreliable
b)they are very costly and
c)huge in size
<u>Second generation are</u>
a)they use a transistor
b)smaller in size compared to first generation
c)they are faster than the first generation
<u>Third generation are </u>
a)its more reliable than the first generation and the second generation
b)faster than first generation and the second generation
c)consume less electricity
<u>Fourth generation are</u>
a) they are very cheap
b)they are very small in size
c)they are portable and reliable
Explanation:
explanation is in the answer
The keyboard shortcut used to copy data from a cell is A.) Ctrl + c command +C
I hope this helped!! :)