Answer:
I probably won't awnser them all but I'll try my best
Explanation:
Hacking is a breach of privacy online usually caused by some kind of malware injected into your device there's multiple types of this program or files malware which simply damages and harms your device. A Trojan horse is a program which tricks you by selling you a fake product which has code in it which has code which gives the hacker remote access to your device this program is usually free and masked like a crack or patch of a certain program. U got the second an third question with this one so u can just divide it into pieces. Piracy is Hacking but this time the hacker is stealing ur information through the malware. Invasion of privacy can have multiple forms online and offline. Online intrusion is when a service gives out information you entrust to it while off line Intrusion is stalking trespassing blackmail etc.
Class B would be the correct answer.
The key would he use to create the digital signature is Mike public key.
<h3>Which key is used to sign messages?</h3>
Digital signatures are known to be used via public key. Here, the person is said to be one who is said to produce or creates the digital signature that uses a private key to encrypt signature-linked data.
The only way to decrypt a data is only with the signer's public key, the key David would use to create the digital signature is Mike public key.
Learn more about public key from
brainly.com/question/17486027
Smart Watches are taking over normal watches. They are getting WAYYY cheaper. There is one for about $14