Answer:
"Feedback" is the correct answer for the above question.
Explanation:
- Feedback is used in any information system or any communication system to tells that any process is doing in the right direction.
- It is used in communication channels to tell the sender that the message is received by the receiver.
- It is a type of message which is sent by the user to the system that he gets the correct or wrong output by that system.
- The above question asked about the term which is used in the information system which suggests changing the processing activity. This is known as feedback which is described above.
The answer & explanation for this question is given in the attachment below.
Assuming the data was encrypted with YOUR public key, you'll need YOUR private key to decrypt it. That's answer e.
a and b are not solutions by themselves, of course you need to use the decryption algorithm, but a key goes with it.
c would be about symmetric encryption, but this is asymmetric, so different keys are used for encryption and decryption
d is possible, but it would mean anyone can decrypt it (after all the key is public), so then there's no point in encrypting it in the first place.
So e is the only logical answer.