1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin2010 [14]
4 years ago
11

Two users, UserA and UserB, are engaging in secure communication using only asymmetrical encryption. UserA needs to send a secur

e message to UserB. What occurs first?A. ​UserB sends UserA UserB's public key
B. UserA sends UserB UserA's private key
​C. UserA sends a secret key to UserB
Computers and Technology
1 answer:
umka21 [38]4 years ago
5 0

Answer:

The correct answer is A: UserB sends UserA UserB's public key

Explanation:

In Asymmetrical Encryption, the both user involve in the secure communication must have a pair of key called public and private key. There are various step involves with engaging in Asymmetrical encryption, they include:

1. Each user generates a pair of keys to be used for the encryption and decryption of messages.

2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.

3. If User B wishes to send a confidential message to User A, User B encrypts the message using User A's public key.

4. When User A receives the message, User A decrypts it using her private key. No other recipient can decrypt the message because only User A knows User A's private key.

Therefore, from the steps above, Option B and C are wrong because the private key/secret key should never be shared between users in asymmetrical encryption.

Option A is the correct answer as UserB sends UserA UserB's public key which is available to the everyone.

You might be interested in
______________________________Encompasses all of the information contained within a single business process or unit of work, and
Rudik [331]

Answer:

transactional information

Explanation:

8 0
3 years ago
The most frequently applied heuristic in problem solving is a(an) _________, which involves repeated tests for differences betwe
Dvinal [7]

Answer:

means-ends analysis

Explanation:

<h2><u>Fill in the blanks</u></h2>

The most frequently applied heuristic in problem solving is a <u>means-end analysis,</u>  which involves repeated tests for differences between the desired outcome and what currently exists.

8 0
4 years ago
Click _______ to add a new column to a table.
Sophie [7]
The answer is Insert control B

5 0
4 years ago
Read 2 more answers
Create a program in c/c++ which accepts user input of a decimal number in the range of 1 -100. Each binary bit of this number wi
kirill115 [55]

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

void switch_fun(int input)

{

//array to store binary of input number

   int bin[7];

   // convert the number into binary

   for(int i=0; input>0; i++)

       {

           bin[i]=input%2;

           input= input/2;

       }

   // print the switch number and their status

   cout<<"Switch number:\t 1\t 2\t 3\t 4\t 5\t 6\t 7 \n";

   cout<<"status:      ";

   for(int j=6;j>=0;j--)

   {

   // if bit is 1 print "ON" else print "OFF"

       if(bin[j]==1)

           cout<<"\t ON";

       else

           cout<<"\t OFF";

   }

}

int main()

{

   int n;

   cout<<"enter the number between 1-100 only:");

   // read a number in decimal

   cin>>n

   // validate the input

   while(n<1 ||n>100)

   {

     cout<<"wrong input!! Input must be in between 1-100:"<<endl;

     cout<<"enter the number again :";

     cin>>n;

   }

// call the function with input parameter

  switch_fun(n);

return 0;

}

Explanation:

Read a decimal number from user. If the number is not between 1 to 100 the it will again ask user to enter the number until the input is in between 1-100.Then it will call the fun() with parameter n. First it will convert the decimal to binary array of size 7.Then print the status of switch.If bit is 1 then print "ON" else it will print "OFF".

Output:

enter the number between 1-100 only:-5

wrong input!! Input must be in between 1-100:

enter the number again :125

wrong input!! Input must be in between 1-100:

enter the number again :45

Switch number:   1       2       3       4       5       6       7

Status:          OFF     ON      OFF     ON      ON      OFF     ON

8 0
4 years ago
Match the job roles with their appropriate qualifications
UNO [17]
Knowledge...- software QA engineer
Master’s...- business analyst
course...- network and computer admin
training...- multimedia artist
3 0
4 years ago
Other questions:
  • How has the development of personal computer hardware and software reversed some of the trends brought on by the industrial revo
    15·1 answer
  • One of the most toxic components of a computer is the
    11·1 answer
  • : What is the difference between the Audio Mixer and the<br> Audio Meters Panel?
    7·2 answers
  • Write a complete function called lowestPosition() which takes as array (of double) and the number of elements used in the array
    9·1 answer
  • If a website ends with .gov does it mean that its written by the government or?
    11·2 answers
  • Which of the following terms best describes the product development process?
    8·1 answer
  • Explain Spreadsheet and its Basics
    13·1 answer
  • To connect several computers together, one generally needs to be running a(n) ____ operating system
    6·1 answer
  • Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network
    13·1 answer
  • Write pseudo code that performs the following: Ask a user to enter a number. If the
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!