Difference between symmetric and asymmetric encryption

Write a very brief scenario of what “could” happen if a brand new Linux user accidentally logged in as root instead of as another type of user. Try to make your scenario as realistic as possible, but limit it to two sentences.List one difference between symmetric and asymmetric encryption. When would what you listed be used over the other?

Order from us and get better grades. We are the service you have been looking for.