Hello! I believe the answer for this is "True"!
Answer:
Nancy's private key
Explanation:
She's receiving it. That means Matthew used her public key to encrypt it. She should decrypt it using her private key. Watch this video for clarification :)
Watch The Internet: Encryption & Public Keys on the big video site which cannot be named on brainly :p
Answer:
so a program can reference it; however, it does not necessarily need an event handler
Explanation: