hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

A fish tank contains 18 goldfish and 22 guppies. If you randomly select 2 fish, what is the probability that they are both goldfish?
What is the following sentence written as an expression?" Add the product of 3 and 6 to 4".
Which statement best characterizes animism? A. It combines natural, human, and spiritual forces. B. It's composed of irrational superstitions that arise i
cyclist were 3/4 finished with their ride when they reached the 15 kilometer mark. how long was the ride?
A fish tank contains 18 goldfish and 22 guppies. If you randomly select 2 fish, what is the probability that they are both goldfish?
3 ways living creatures use carbohydrates
Convert the scale map to unit rate. For every 3/10 of an inch that equals 7/8 mile. How many inches represents one mile?
9/4 is between what two numbers
What is the capillary action of water?
3y=x (tell whether x and y show direct variation