Answer:
userB will use his/her private key.
Explanation:
The steps involved in using asymmetric cryptographic algorithm are as follow:
1. Each user generates a pair of keys to be used for the encryption and decryption of messages.
2. Each user places one of the two keys in a public register or other accessible file. This is the public key. The companion key is kept private.
3. If UserA wishes to send a confidential message to UserB, UserA encrypts the message using UserB's public key.
4. When UserB receives the message, she decrypts it using her private key.
use an anchor tag(<a>This is an anchor tag</a>) and use the href attribute and set it's destination to the section element who's id or class is "sisters".
Example:
<a href="#Sisters">Click Here!</a>
then you can add this somewhere on the document.
<section id="Sisters">Hello World!</section>
Answer:
_____Router___ allows the cloud controller to locate instances on separate zones to boost redundancy.
Explanation:
A router, as a networking device, forwards data packets between one computer network and other networks. With a router, one can use wired and wireless devices to connect to the Internet. Unlike a modem, which connects the home network to a wider internet, a router can enable the networks to interact with one another without using the Internet.