I've included my code in the picture below. Best of luck.
Answer: is this a real question but I think it would be Ip address hope this helps :)))
Explanation:
The <DEL> or <Delete> key makes the first character AFTER the cursor
disappear, and everything after it then moves back one space to close up
the hole.
Example:
If I have this in my document ... Most trees are green.
And my cursor is after the 'a', like this: Most trees a|re green.
Now, if I hit the <delete> key, it deletes the
'r' after the cursor, and the hole closes up,
and the cursor stays where it is: Most trees a|e green.
Answer:
userB will use his/her private key.
Explanation:
The steps involved in using asymmetric cryptographic algorithm are as follow:
1. Each user generates a pair of keys to be used for the encryption and decryption of messages.
2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.
3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.
4. When UserB receives the message, she decrypts it using her private key.