Answer:
userB will use his/her private key.
Explanation:
The steps involved in using asymmetric cryptographic algorithm are as follow:
1. Each user generates a pair of keys to be used for the encryption and decryption of messages.
2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.
3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.
4. When UserB receives the message, she decrypts it using her private key.
Answer:
Following are the code to this question:
def capital(val):#defining a method that takes string value as parameter
x=True#defining boolean variable
r=''#defining string variable
for i in val:#defining loop to convert the first character into upper case
if i.isalpha() and x:#defining condition to check input value is string
r=r+i.upper()#change value into uppercase and hold value in r variable
x=False#assign value false in boolean variable
elif i=='.' or i=='?' or i=='!':#check symbols
r=r+i#add value in r variable
x=True#assign value True in boolean variable
else:
r=r+i#add all value in r variable
return r#return r variable value
val=input()#input value in val variable
print(capital(val))#called the function which print the return value
Output:
please find the attachment.
Explanation:
- In the above python program, a method "capital" is declared, which accepts a "val" a string value in its parameter, and inside the method one boolean "x" and one string "r" variable is used, in which r stores return value.
- In the next step, for loop is declared, inside the loop, the conditional statement is used, in if the block it checks string value and converts the first character into upper case and assigns value false in the boolean variable.
- In the next step, elif block is defined that adds value in r variable and at the last, it will return function value, at the last step "val" variable is declared that input value from the user and pass into the method and print its return value.
Poke hole with thin but strong object
Or buy new sharpener
<span>Create new ad groups with related keywords grouped together</span>
The correct answer is B. A throughput refers to how much a data can be transmitted from a certain amount of time from one location to another. It is also used to measure the function of hard drives and internet connections.