Answer:
userB will use his/her private key.
Explanation:
The steps involved in using asymmetric cryptographic algorithm are as follow:
1. Each user generates a pair of keys to be used for the encryption and decryption of messages.
2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.
3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.
4. When UserB receives the message, she decrypts it using her private key.
The technological tools that can be considered important for storing critical files are battery backup systems and drives. These devices can be used to store data and supply energy.
<h3>Battery backup systems</h3>
A home battery backup system is a device used to keep the electrical system working in the event when the electrical source goes down.
In computation, there are three major classes of batteries systems: Lead-Acid, Nickel-Cadmium, and Lithium-Ion.
An uninterruptible power supply (UPS) can be considered as a battery backup supply capable of charging when the power is on.
Learn more about battery backup systems here:
brainly.com/question/7125266
Answer: To adjust the spacing between characters that make up a word
Explanation: Kerning refers to the way spacing between two specific characters is adjusted. The idea is to give a better looking result by reducing the spacing between characters that fit together nicely (such as "A" and "V") and increasing the spacing between characters that don't. Select the text that you want to change.