Answer:
userB will use his/her private key.
Explanation:
The steps involved in using asymmetric cryptographic algorithm are as follow:
1. Each user generates a pair of keys to be used for the encryption and decryption of messages.
2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.
3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.
4. When UserB receives the message, she decrypts it using her private key.
End-User Software. Because it is not professional
Answer:
Option a, b, d, f, and j is legal method calls.
Explanation:
In the given question some information is missing, that is the method definition which can be described as follows:
Method definition:
int x =2, y=3; //defining integer variable
int mathMethod (int x) //method definition
{//method body
int z=x+y; //calculate value
return z; //return value
}
In the given question option a, b, d, f, and j is legal, because these options follow the correct syntax, and other option were incorrect which can be defined as follows:
- In option c, It is illegal because it accepts only one parameter.
- In option e, It is accepts long number, that's why it is illegal.
- In option g, It accepts float value, that's why it is illegal.
- In option h, It doesn't accepts any parameter.
- In option i, It isn't use in method.