hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

Which continent lies between 15 n and 60 s
Please help I’m almost done
The happiest day of my life ourtour to ooty ule went for atrip to the beautiful hill stationlast month . It was a nicefamily trip where we enjoyeda lot . The tr
I need the measurement of each angle (please show work)
Amira pulls a 3 pound wagon 4 feet. How much work has she done? 3 ft-lbs. 4 ft-lbs. 7 ft-lbs. 12 ft-lbs.
What’s the volume of the cylinder with a radius of 10 and a height of 30?
Which phrase defines “muster” best? to anger someone to collect, gather to smile, laugh to run quickly
What is rabbit proof fence story(book) about? Someone help me x
The energy that excites the photosystems is supplied by
Question 31 (1 point) - Patriots defeated the Loyalists - Patriots led by Elijah Clarke - Austin Dabney helped Elijah Clarke by giving him his horse - As a re