Answer:
userB will use his/her private key.
Explanation:
The steps involved in using asymmetric cryptographic algorithm are as follow:
1. Each user generates a pair of keys to be used for the encryption and decryption of messages.
2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.
3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.
4. When UserB receives the message, she decrypts it using her private key.
What are you trying to use if it is windows just go to desktop and right click and you will see open new text document or if you go to your task bar (bottom of screen) and search for word you may have word pad which you can also use.
Answer
Spelling and Grammar checkers
Explanation
A word processor is a software program for editing, storing, manipulating, and formatting text entered from a keyboard for the purpose providing the intended output. t allows users to create, edit, and print documents. It enables you to write text, store it electronically, display it on a screen,
Spelling and Grammar checkers are the inbuilt components of word processors programs for personal computers. They have Salient features that helps in identifying grammatical errors and misspellings.
Combination of the Star and bus topologies.
Answer: Option 2.
<u>Explanation:</u>
A tree topology is a formal composed report containing business objectives, the techniques on how these objectives can be accomplished, and the time period inside which these objectives should be accomplished.
A tree network, or star-bus network, is a mixture organize topology in which star systems are interconnected by means of transport systems. Tree systems are various leveled, and every hub can have a discretionary number of kid hubs.