hopdesV6ilAm2and
hopdesV6ilAm2and hopdesV6ilAm2and
  • 03-03-2016
  • Computers and Technology
contestada

Question 9.9. Encryption is BEST described as
a. back-up command. privacy control. tool for hackers. spam filter

Respuesta :

LexCon
LexCon LexCon
  • 03-03-2016
A. Back Up Command. They can use it for hackers, but it is mostly used to protect your computer and documents from any hackers, but the hackers themselves can use it too.
Answer Link

Otras preguntas

why do economists measure the cost or money price of thhings when oppritunity cost is what we actually are considering when we decide whether or not to purchase
If you need a wet paper towel out on the counter is a vintage I was change of state cuts is this
What is the analogous position in a state government?
A jeweler is heating a bar if gold. It takes 7 joules of heat to raise temperture if the bar 1degrees celsuisThe initial temperture of the bar is 25degress cels
Deborah found that six of the 24 students in her class only cell phone what is the ratio of students out on his cellphone to students that do not
Which area of geographical study focuses on examining landforms, soils, and bodies of water?
If the length of one side of a square is 12.0 m, what is the perimeter of the square?
Point A is at (3, 2.7) and point B is at (3, 1.4) on a coordinate grid. The distance between the two points is ____. Input numbers and decimal point only, such
whats the answer to 9s+3=57
What is the analogous position in a state government?