1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nana76 [90]
3 years ago
8

If Nancy receives an encrypted message from Matthew, which key does she use to read it? Nancy’s private key Nancy’s public key M

atthew’s private key Matthew’s public key
Computers and Technology
1 answer:
Juliette [100K]3 years ago
7 0

Answer:

Nancy's private key

Explanation:

She's receiving it.  That means Matthew used her public key to encrypt it.  She should decrypt it using her private key.  Watch this video for clarification :)

Watch The Internet: Encryption & Public Keys on the big video site which cannot be named on brainly :p

You might be interested in
What is output? c = 1 sum = 0 while (c < 10): c = c + 3 sum = sum + c print (sum)
Valentin [98]

Answer:

21

Explanation:

The values of c that make it into the loop are 1, 4, 7.

The values that are added to sum are 3 higher, i.e., 4,7 and 10.

The sum of those is 21.

p.s. why did you not run the program yourself?

3 0
3 years ago
write a pseudo code that will allow a user to enter a number and divide that number by eleven and take the the modules of the en
emmasim [6.3K]

Answer:

sdhuvbfuisg

Explanation:

4 0
3 years ago
The byte that
qwelly [4]
The decimal value 15 would be A. 00001111
4 0
2 years ago
Beverly is creating a website for her new clothing company. Aside from including photographs, how can she use the index page to
igomit [66]

C. She can use bright, contrasting colors and place a link to the index of summer clothing product pages in a noticeable location.

3 0
3 years ago
Read 2 more answers
Which part of a resume gives an account of past jobs and internships?
kirill [66]

Answer:

Internships section above your Work History section

Explanation:

5 0
3 years ago
Other questions:
  • You want to deploy software using group policy. what is necessary before deciding to assign the software to your user accounts?
    11·1 answer
  • _____ documentation is designed to help programmers and systems analysts understand the application software and maintain it aft
    12·1 answer
  • You can tell that the equals() method takes a ____ argument because parentheses are used in the method call.
    6·1 answer
  • If you create and invoke a recursive function without accounting for a base case, what can go wrong?
    15·1 answer
  • What is the difference between delete and backspace key?​
    12·2 answers
  • 25 Points Discuss games you have played that have poor game design puzzles and how you might improve them.
    10·1 answer
  • How to stay organized in an online school?
    7·1 answer
  • Donna is a graphic designer working on a poster for a music concert. What is her objective?
    7·2 answers
  • How many miss Dragon Ball Abridged?
    5·2 answers
  • Who plays warzone im a roze sweat and ill try to carry with loadout
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!