Answer:
userB will use his/her private key.
Explanation:
The steps involved in using asymmetric cryptographic algorithm are as follow:
1. Each user generates a pair of keys to be used for the encryption and decryption of messages.
2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.
3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.
4. When UserB receives the message, she decrypts it using her private key.
Answer:
<h2>
Controlled maintenance and configuration change control.</h2>
Explanation:
Among the types of LAN control standards are <em><u>controlled maintenance, </u></em>which creates the schedules on LAN- attached devices for scheduled preventtative and consisten maintenance, and <em><u>configuration change control.</u></em>
Answer:
complex formatting feature enables you to represent text as colorful
visuals.
mark as brainliest
Answer:
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID tag consists of a tiny radio transponder; a radio receiver and transmitter.
Radio Frequency Identification (RFID) is a technology designed to allow objects, animals and even human beings to be identified, located, and tracked using radio frequency signals.
Answer:
An entity relationship diagram gives a snapshot of how these entities relate to each other. You could call it the blueprint that underpins your business architecture, offering a visual representation of the relationships between different sets of data (entities)
<em>Hope u got it </em>
<em>If you have any question just ask me</em>
<em>If you think this is the best answer please mark me as brainliest</em>
<em></em>