Answer:
userB will use his/her private key.
Explanation:
The steps involved in using asymmetric cryptographic algorithm are as follow:
1. Each user generates a pair of keys to be used for the encryption and decryption of messages.
2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.
3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.
4. When UserB receives the message, she decrypts it using her private key.
Answer:
B.) Open Office Impress
Explanation:
The options are:
A.) Open Office Writer
B.) Open Office Impress
C.) an outline
D.) photographs
Out of the above, the Impress is used for doing complex presentation, and its one of the best tool for it like PowerPoint. Its quite the same as PowerPoint, and it supports both ppt format as well as odp or the open document presentation format. You can make very complex presentations with the help of the Open office Impress.
Answer:
D. a potential hazard
Explanation:
Abrupt changes in road surface or the shape of the road may indicate a potential hazard.
D.) Write down the error message and research the cause based on the message.
Answer:
The reasons for Blue Screen Of Death are as following:-
- Faulty Memory.
- Power Supply Issue.
- Overheating of Components.
- Malfunctioning Hardwares.
- Poorly coded device drivers.
- Hardware runnign beyond it's capacity.
- Bugs in the Operating System Kernel.
These are the some of the reasons why the blue screen of death is caused.