hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

why do living things store energy in lipids instead of in carbohydrate?
Of the 8760 hours in a year, one television was on for 2190 hours. What percent is this?
Of the 8760 hours in a year, one television was on for 2190 hours. What percent is this?
How did Reconstruction affect daily life in South Carolina?
The republics of the USSR declared themselves: satellites counties independent countries a federation
Hoover's political life ended as a result of the (A) infantry attacking the Bonus Army (B) Bonus Army attacking the infantry (C) veto of the Patman Bill (D) pas
On January 1st, Jerome concocts a rumor and tells Beth. On January 2nd, they each tell a new person. By the end of January 2nd, four people have heard the rumor
is 3/12 simplified 1/4
The sum of two consecutive integers is 37. Write an equation that models this situation and find the values of the two integers.
you are dealt one card from a standard 52-card deck