hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

Based on Agamemnon’s and Amphimedon’s speeches in The Odyssey - Amphimedon, how have the characters been changed by their deaths? Both show humility after their
Look at the attachment! This is algebra. 10 points!​
If 343 superscript x baseline = 49 superscript 4 minus x, what is the value of x?
Which of these is a reason an engineer may choose to use a prefabricated building component? A. She wants to make the building more original and unique. B. She
Which of the following is considered the process of budding? A. Propagating the desired variety of shrubs or trees. B. Growing of embryo from the egg cell witho
Someone explain the equation
Which theme does this excerpt from Bram Stoker's Dracula reflect? Dracula by Bram Stoker (excerpt) In his life, his living life, he go over the Turkey frontier
What prompted Beneatha’s dream to become a doctor? Select one: a. prove she is just as good as George Murchison. b. making good money to support the family. c.
What is the equation of the quadratic function shown in the graph?
Convert the angle from radians to degrees: [tex]\frac{5}{6}\pi[/tex] with working