Answer:
The correct answer is A: UserB sends UserA UserB's public key
Explanation:
In Asymmetrical Encryption, the both user involve in the secure communication must have a pair of key called public and private key. There are various step involves with engaging in Asymmetrical encryption, they include:
1. Each user generates a pair of keys to be used for the encryption and decryption of messages.
2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.
3. If User B wishes to send a confidential message to User A, User B encrypts the message using User A's public key.
4. When User A receives the message, User A decrypts it using her private key. No other recipient can decrypt the message because only User A knows User A's private key.
Therefore, from the steps above, Option B and C are wrong because the private key/secret key should never be shared between users in asymmetrical encryption.
Option A is the correct answer as UserB sends UserA UserB's public key which is available to the everyone.
Answer:
Overcome financial obstacles. Reduced pressure to repay.
Explanation:
Overcome financial obstacles: the first advantage of having someone invest in your company is that they can help you overcome financial obstacles to develop and grow as a business.
Reduced pressure to repay: As an investment isn't classified as a loan, an investor usually won't restrict you the rules or loan. This means that you're not usually held to tight deadlines and upfront repayments, with interest added on top.
Answer:
There is no problem. Your main function returns zero to the operating system, which is reported as the exit code. Everything is working correct.
They both do the same thing.