Answer:
userB will use his/her private key.
Explanation:
The steps involved in using asymmetric cryptographic algorithm are as follow:
1. Each user generates a pair of keys to be used for the encryption and decryption of messages.
2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.
3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.
4. When UserB receives the message, she decrypts it using her private key.
Protocal
I need to make this 20 charaters so ye
Eye contact, Taking notes, being quiet.I mean there is a lot of ways
[1] is false, because we are talking about light reaching Earth's surface as a whole, and not in one specific place.
[2] is false, because even if it was in the middle of the night, the other side of the world will be recieving pretty much just as much light as you did the following day.
[3] is false, because even though the sun comes up lower during Winter months, and higher during Summer months, seasons are not constant throughout the entire world. So for what may be Winter for you, will likely be Summer for someone else, so still, just as much light is reaching the Earth.
[4] is false, because wind doesn't affect how light travels.
[5] is true, because clear skies will allow more light to come through that cloudy skies, for example, meaning the amount of light reaching the Earth's surface would not be consistent.