Answer:
userB will use his/her private key.
Explanation:
The steps involved in using asymmetric cryptographic algorithm are as follow:
1. Each user generates a pair of keys to be used for the encryption and decryption of messages.
2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.
3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.
4. When UserB receives the message, she decrypts it using her private key.
<span>All Rights Reserved means that people can see your work but you still have complete control over your work. </span>
A hyperlink is a link that can direct a person to another website when clicked. So the answer would click on the link to go directly to a website. To insert an image or sound you would use something else. And a hyperlink doesn't restrict a person to just the publisher information. I hope this helps!
Because of the reflection on the window or mirror.
Answer:
False
Explanation:
Hackers usually perform their attacks in teams, the idea of a lone wolf hacker (single hacker) executing an attack isn't frequent, they work together and have their team names and they are known for their various attacks done for various reasons, reason can be political, business, competition, and so on.