Yeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeesss i have
Assuming the data was encrypted with YOUR public key, you'll need YOUR private key to decrypt it. That's answer e.
a and b are not solutions by themselves, of course you need to use the decryption algorithm, but a key goes with it.
c would be about symmetric encryption, but this is asymmetric, so different keys are used for encryption and decryption
d is possible, but it would mean anyone can decrypt it (after all the key is public), so then there's no point in encrypting it in the first place.
So e is the only logical answer.
Answer:
A. computers will be replaced by new technology
Answer:
Communications and Information Management describes systems and methods that help to ensure that incident personnel and other decision makers have the means and information they need to make and communicate decisions.