Answer:
You cite them correctly and that the statistics are real.
Explanation:
Assuming the data was encrypted with YOUR public key, you'll need YOUR private key to decrypt it. That's answer e.
a and b are not solutions by themselves, of course you need to use the decryption algorithm, but a key goes with it.
c would be about symmetric encryption, but this is asymmetric, so different keys are used for encryption and decryption
d is possible, but it would mean anyone can decrypt it (after all the key is public), so then there's no point in encrypting it in the first place.
So e is the only logical answer.
Answer:
No. This is not more secure.
Explanation:
this is not more secure than having all of Carol, bob and Alice having the same key.
alice would be able to know Carol's key for her to be able to verify the answer Carol gave to a challenge by her. she would also have to know bob's key to do the same.
any of these 3 would have to know someone else's secret key to verify answers to any challenge.
the challenge is to know the secret keys if the other two and if done, decryption can easily be done and they can impersonate.
Answer:
Bid on item
Explanation:
Consumers who wish to make a purchase from other consumer on ebay need to first of all bid on the item. This is done by specifying the price in which the purchase should be made.
When this is done, the seller contacts the buyer if he/she’s okay with the price of the goods and services and other formalities are discussed.
Answer:
Surface Laptop 3 - 15", Platinum (metal), AMD Ryzen 5 3580U, 8GB, 128GB